Show simple item record

dc.contributor.editorAssad, Safwan El
dc.contributor.editorLozi, René
dc.contributor.editorPuech, William
dc.date.accessioned2022-05-06T11:21:24Z
dc.date.available2022-05-06T11:21:24Z
dc.date.issued2022
dc.identifierONIX_20220506_9783036537672_74
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/81008
dc.description.abstractNowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issuesen_US
dc.subject.classificationthema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBX History of engineering and technologyen_US
dc.subject.otherbit independence criterion
dc.subject.otherbit independence
dc.subject.otherRC4
dc.subject.otherstream cipher
dc.subject.othercomplexity
dc.subject.otherchaos-based stream cipher
dc.subject.otherSPCNG
dc.subject.other3D chebyshev
dc.subject.otherlogistic
dc.subject.otherskew-tent
dc.subject.otherFPGA
dc.subject.otherperformance
dc.subject.othermuseum
dc.subject.otherdigital copyright management
dc.subject.otherblockchain
dc.subject.othersmart contract
dc.subject.otherauthorization model
dc.subject.othercoupled map lattice
dc.subject.otherintermittent jumping
dc.subject.othermulti-chaos
dc.subject.otherpublic key exchange
dc.subject.othersecurity
dc.subject.otherasymmetric
dc.subject.otherasymmetric algorithm
dc.subject.othercryptography
dc.subject.otherframework
dc.subject.otherlimited computational power
dc.subject.othercomputationally biased
dc.subject.otherintrusion detection systems
dc.subject.othermachine learning
dc.subject.othercommunication
dc.subject.otherdigital cash
dc.subject.otherprivacy
dc.subject.otherprivacy preserving
dc.subject.otherhomomorphic encryption
dc.subject.otherfederated learning
dc.subject.othern/a
dc.titleCryptography and Its Applications in Information Security
dc.typebook
oapen.identifier.doi10.3390/books978-3-0365-3768-9
oapen.relation.isPublishedBy46cabcaa-dd94-4bfe-87b4-55023c1b36d0
oapen.relation.isbn9783036537672
oapen.relation.isbn9783036537689
oapen.pages202
oapen.place.publicationBasel


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by/4.0/