Lightweight Cryptographic Techniques and Cybersecurity Approaches
In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (Io...
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
IntechOpen
2022
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_97128 | ||
005 | 20230215 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20230215s2022 xx |||||o ||| 0|eng d | ||
020 | |a intechopen.97981 | ||
020 | |a 9781803557335 | ||
020 | |a 9781803557328 | ||
020 | |a 9781803557342 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5772/intechopen.97981 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UTN |2 bicssc | |
100 | 1 | |a Ramakrishnan, Srinivasan |4 edt | |
700 | 1 | |a Ramakrishnan, Srinivasan |4 oth | |
245 | 1 | 0 | |a Lightweight Cryptographic Techniques and Cybersecurity Approaches |
260 | |b IntechOpen |c 2022 | ||
300 | |a 1 electronic resource (146 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT). It includes seven chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Network security |2 bicssc | |
653 | |a Computer networking & communications | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/11190/authors_book/authors_book.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/97128 |7 0 |z DOAB: description of the publication |