Cryptography and Security in Computing
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are d...
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
IntechOpen
2012
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_65707 | ||
005 | 20210420 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210420s2012 xx |||||o ||| 0|eng d | ||
020 | |a 2213 | ||
020 | |a 9789535101796 | ||
020 | |a 9789535156154 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5772/2213 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UT |2 bicssc | |
100 | 1 | |a Sen, Jaydip |4 edt | |
700 | 1 | |a Sen, Jaydip |4 oth | |
245 | 1 | 0 | |a Cryptography and Security in Computing |
260 | |b IntechOpen |c 2012 | ||
300 | |a 1 electronic resource (258 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Computer networking & communications |2 bicssc | |
653 | |a Cloud computing | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/1778/authors_book/authors_book.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/65707 |7 0 |z DOAB: description of the publication |