Afficher la notice abrégée

dc.contributor.editorSen, Jaydip
dc.date.accessioned2021-04-20T15:23:57Z
dc.date.available2021-04-20T15:23:57Z
dc.date.issued2012
dc.identifierONIX_20210420_9789535101796_1064
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/65707
dc.description.abstractThe purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UT Computer networking and communicationsen_US
dc.subject.otherCloud computing
dc.titleCryptography and Security in Computing
dc.typebook
oapen.identifier.doi10.5772/2213
oapen.relation.isPublishedBy78a36484-2c0c-47cb-ad67-2b9f5cd4a8f6
oapen.relation.isbn9789535101796
oapen.relation.isbn9789535156154
oapen.imprintIntechOpen
oapen.pages258


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée

https://creativecommons.org/licenses/by/3.0/
Excepté là où spécifié autrement, la license de ce document est décrite en tant que https://creativecommons.org/licenses/by/3.0/