Applied Cryptography and Network Security
Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing worl...
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
IntechOpen
2012
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_65770 | ||
005 | 20210420 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210420s2012 xx |||||o ||| 0|eng d | ||
020 | |a 2651 | ||
020 | |a 9789535102182 | ||
020 | |a 9789535156826 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5772/2651 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UT |2 bicssc | |
100 | 1 | |a Sen, Jaydip |4 edt | |
700 | 1 | |a Sen, Jaydip |4 oth | |
245 | 1 | 0 | |a Applied Cryptography and Network Security |
260 | |b IntechOpen |c 2012 | ||
300 | |a 1 electronic resource (392 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Computer networking & communications |2 bicssc | |
653 | |a Computer networking & communications | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/2263/authors_book/authors_book.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/65770 |7 0 |z DOAB: description of the publication |