Lightweight cryptographic techniques and cybersecurity approaches / / edited by Srinivasan Ramakrishnan.

In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (Io...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:London, England : : IntechOpen,, 2022.
Year of Publication:2022
Language:English
Physical Description:1 online resource (146 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01993nam a2200301 i 4500
001 993603615004498
005 20230626133630.0
006 m o d
007 cr |||||||||||
008 230626s2022 enk o 000 0 eng d
035 |a (CKB)5580000000514416 
035 |a (NjHacI)995580000000514416 
035 |a (EXLCZ)995580000000514416 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
050 4 |a QA76.9.A25  |b .L544 2022 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Lightweight cryptographic techniques and cybersecurity approaches /  |c edited by Srinivasan Ramakrishnan. 
264 1 |a London, England :  |b IntechOpen,  |c 2022. 
300 |a 1 online resource (146 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on publisher supplied metadata and other sources. 
520 |a In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT). It includes seven chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more. 
505 0 |a 1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data. 
650 0 |a Computer security. 
650 0 |a Cryptography. 
776 |z 1-80355-734-6 
700 1 |a Ramakrishnan, Srinivasan,  |e editor. 
906 |a BOOK 
ADM |b 2023-07-06 03:18:35 Europe/Vienna  |f system  |c marc21  |a 2023-02-11 21:29:23 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5343042970004498&Force_direct=true  |Z 5343042970004498  |b Available  |8 5343042970004498