Theory and Practice of Cryptography and Network Security Protocols and Technologies
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confiden...
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
IntechOpen
2013
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_66584 | ||
005 | 20210420 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210420s2013 xx |||||o ||| 0|eng d | ||
020 | |a 56823 | ||
020 | |a 9789535111764 | ||
020 | |a 9789535157298 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5772/56823 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UT |2 bicssc | |
100 | 1 | |a Sen, Jaydip |4 edt | |
700 | 1 | |a Sen, Jaydip |4 oth | |
245 | 1 | 0 | |a Theory and Practice of Cryptography and Network Security Protocols and Technologies |
260 | |b IntechOpen |c 2013 | ||
300 | |a 1 electronic resource (158 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Computer networking & communications |2 bicssc | |
653 | |a Network security | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/3412/authors_book/authors_book.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/66584 |7 0 |z DOAB: description of the publication |