Lightweight Cryptographic Techniques and Cybersecurity Approaches / / edited by Srinivasan Ramakrishnan.
In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (Io...
Saved in:
TeilnehmendeR: | |
---|---|
Place / Publishing House: | London : : IntechOpen,, 2022. |
Year of Publication: | 2022 |
Language: | English |
Physical Description: | 1 online resource (146 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993581449604498 |
---|---|
ctrlnum |
(CKB)5700000000338667 (NjHacI)995700000000338667 (EXLCZ)995700000000338667 |
collection |
bib_alma |
record_format |
marc |
spelling |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / edited by Srinivasan Ramakrishnan. London : IntechOpen, 2022. 1 online resource (146 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on online resource; title from PDF title page (IntechOpen, viewed March 27, 2023). In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT). It includes seven chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more. 1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data. Computer security. 1-80355-732-X Ramakrishnan, Srinivasan, editor. |
language |
English |
format |
eBook |
author2 |
Ramakrishnan, Srinivasan, |
author_facet |
Ramakrishnan, Srinivasan, |
author2_variant |
s r sr |
author2_role |
TeilnehmendeR |
title |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / |
spellingShingle |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / 1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data. |
title_full |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / edited by Srinivasan Ramakrishnan. |
title_fullStr |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / edited by Srinivasan Ramakrishnan. |
title_full_unstemmed |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / edited by Srinivasan Ramakrishnan. |
title_auth |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / |
title_new |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / |
title_sort |
lightweight cryptographic techniques and cybersecurity approaches / |
publisher |
IntechOpen, |
publishDate |
2022 |
physical |
1 online resource (146 pages) |
contents |
1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data. |
isbn |
1-80355-733-8 1-80355-732-X |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 L544 42022 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT ramakrishnansrinivasan lightweightcryptographictechniquesandcybersecurityapproaches |
status_str |
n |
ids_txt_mv |
(CKB)5700000000338667 (NjHacI)995700000000338667 (EXLCZ)995700000000338667 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Lightweight Cryptographic Techniques and Cybersecurity Approaches / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1764995728077225984 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02017nam a2200301 i 4500</leader><controlfield tag="001">993581449604498</controlfield><controlfield tag="005">20230327132305.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230327s2022 enk o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-80355-733-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5700000000338667</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995700000000338667</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995700000000338667</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.L544 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Lightweight Cryptographic Techniques and Cybersecurity Approaches /</subfield><subfield code="c">edited by Srinivasan Ramakrishnan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (146 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (IntechOpen, viewed March 27, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT). It includes seven chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-80355-732-X</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramakrishnan, Srinivasan,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-04-15 12:07:32 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-12-05 16:10:45 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5343042970004498&Force_direct=true</subfield><subfield code="Z">5343042970004498</subfield><subfield code="8">5343042970004498</subfield></datafield></record></collection> |