Cryptography and Its Applications in Information Security

Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their...

Full description

Saved in:
Bibliographic Details
Other Authors: Assad, Safwan El (Editor), Lozi, René (Editor), Puech, William (Editor)
Format: Electronic Book Chapter
Language:English
Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2022
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_81008
005 20220506
003 oapen
006 m o d
007 cr|mn|---annan
008 20220506s2022 xx |||||o ||| 0|eng d
020 |a books978-3-0365-3768-9 
020 |a 9783036537672 
020 |a 9783036537689 
040 |a oapen  |c oapen 
024 7 |a 10.3390/books978-3-0365-3768-9  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a TB  |2 bicssc 
072 7 |a TBX  |2 bicssc 
100 1 |a Assad, Safwan El  |4 edt 
700 1 |a Lozi, René  |4 edt 
700 1 |a Puech, William  |4 edt 
700 1 |a Assad, Safwan El  |4 oth 
700 1 |a Lozi, René  |4 oth 
700 1 |a Puech, William  |4 oth 
245 1 0 |a Cryptography and Its Applications in Information Security 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2022 
300 |a 1 electronic resource (202 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue "Cryptography and Its Applications in Information Security" addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Technology: general issues  |2 bicssc 
650 7 |a History of engineering & technology  |2 bicssc 
653 |a bit independence criterion 
653 |a bit independence 
653 |a RC4 
653 |a stream cipher 
653 |a complexity 
653 |a chaos-based stream cipher 
653 |a SPCNG 
653 |a 3D chebyshev 
653 |a logistic 
653 |a skew-tent 
653 |a FPGA 
653 |a performance 
653 |a museum 
653 |a digital copyright management 
653 |a blockchain 
653 |a smart contract 
653 |a authorization model 
653 |a coupled map lattice 
653 |a intermittent jumping 
653 |a multi-chaos 
653 |a public key exchange 
653 |a security 
653 |a asymmetric 
653 |a asymmetric algorithm 
653 |a cryptography 
653 |a framework 
653 |a limited computational power 
653 |a computationally biased 
653 |a intrusion detection systems 
653 |a machine learning 
653 |a communication 
653 |a digital cash 
653 |a privacy 
653 |a privacy preserving 
653 |a homomorphic encryption 
653 |a federated learning 
653 |a n/a 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/5350  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/81008  |7 0  |z DOAB: description of the publication