Cryptography and Its Applications in Information Security
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their...
Saved in:
Other Authors: | , , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2022
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_81008 | ||
005 | 20220506 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20220506s2022 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-0365-3768-9 | ||
020 | |a 9783036537672 | ||
020 | |a 9783036537689 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-0365-3768-9 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a TB |2 bicssc | |
072 | 7 | |a TBX |2 bicssc | |
100 | 1 | |a Assad, Safwan El |4 edt | |
700 | 1 | |a Lozi, René |4 edt | |
700 | 1 | |a Puech, William |4 edt | |
700 | 1 | |a Assad, Safwan El |4 oth | |
700 | 1 | |a Lozi, René |4 oth | |
700 | 1 | |a Puech, William |4 oth | |
245 | 1 | 0 | |a Cryptography and Its Applications in Information Security |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2022 | ||
300 | |a 1 electronic resource (202 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue "Cryptography and Its Applications in Information Security" addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Technology: general issues |2 bicssc | |
650 | 7 | |a History of engineering & technology |2 bicssc | |
653 | |a bit independence criterion | ||
653 | |a bit independence | ||
653 | |a RC4 | ||
653 | |a stream cipher | ||
653 | |a complexity | ||
653 | |a chaos-based stream cipher | ||
653 | |a SPCNG | ||
653 | |a 3D chebyshev | ||
653 | |a logistic | ||
653 | |a skew-tent | ||
653 | |a FPGA | ||
653 | |a performance | ||
653 | |a museum | ||
653 | |a digital copyright management | ||
653 | |a blockchain | ||
653 | |a smart contract | ||
653 | |a authorization model | ||
653 | |a coupled map lattice | ||
653 | |a intermittent jumping | ||
653 | |a multi-chaos | ||
653 | |a public key exchange | ||
653 | |a security | ||
653 | |a asymmetric | ||
653 | |a asymmetric algorithm | ||
653 | |a cryptography | ||
653 | |a framework | ||
653 | |a limited computational power | ||
653 | |a computationally biased | ||
653 | |a intrusion detection systems | ||
653 | |a machine learning | ||
653 | |a communication | ||
653 | |a digital cash | ||
653 | |a privacy | ||
653 | |a privacy preserving | ||
653 | |a homomorphic encryption | ||
653 | |a federated learning | ||
653 | |a n/a | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/5350 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/81008 |7 0 |z DOAB: description of the publication |