Cryptography and Its Applications in Information Security
| dc.contributor.editor | Assad, Safwan El | |
| dc.contributor.editor | Lozi, René | |
| dc.contributor.editor | Puech, William | |
| dc.date.accessioned | 2022-05-06T11:21:24Z | |
| dc.date.available | 2022-05-06T11:21:24Z | |
| dc.date.issued | 2022 | |
| dc.identifier | ONIX_20220506_9783036537672_74 | |
| dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/81008 | |
| dc.description.abstract | Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information. | |
| dc.language | English | |
| dc.subject.classification | thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues | en_US |
| dc.subject.classification | thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBX History of engineering and technology | en_US |
| dc.subject.other | bit independence criterion | |
| dc.subject.other | bit independence | |
| dc.subject.other | RC4 | |
| dc.subject.other | stream cipher | |
| dc.subject.other | complexity | |
| dc.subject.other | chaos-based stream cipher | |
| dc.subject.other | SPCNG | |
| dc.subject.other | 3D chebyshev | |
| dc.subject.other | logistic | |
| dc.subject.other | skew-tent | |
| dc.subject.other | FPGA | |
| dc.subject.other | performance | |
| dc.subject.other | museum | |
| dc.subject.other | digital copyright management | |
| dc.subject.other | blockchain | |
| dc.subject.other | smart contract | |
| dc.subject.other | authorization model | |
| dc.subject.other | coupled map lattice | |
| dc.subject.other | intermittent jumping | |
| dc.subject.other | multi-chaos | |
| dc.subject.other | public key exchange | |
| dc.subject.other | security | |
| dc.subject.other | asymmetric | |
| dc.subject.other | asymmetric algorithm | |
| dc.subject.other | cryptography | |
| dc.subject.other | framework | |
| dc.subject.other | limited computational power | |
| dc.subject.other | computationally biased | |
| dc.subject.other | intrusion detection systems | |
| dc.subject.other | machine learning | |
| dc.subject.other | communication | |
| dc.subject.other | digital cash | |
| dc.subject.other | privacy | |
| dc.subject.other | privacy preserving | |
| dc.subject.other | homomorphic encryption | |
| dc.subject.other | federated learning | |
| dc.subject.other | n/a | |
| dc.title | Cryptography and Its Applications in Information Security | |
| dc.type | book | |
| oapen.identifier.doi | 10.3390/books978-3-0365-3768-9 | |
| oapen.relation.isPublishedBy | 46cabcaa-dd94-4bfe-87b4-55023c1b36d0 | |
| oapen.relation.isbn | 9783036537672 | |
| oapen.relation.isbn | 9783036537689 | |
| oapen.pages | 202 | |
| oapen.place.publication | Basel |
Fichier(s) constituant ce document
| Fichiers | Taille | Format | Vue |
|---|---|---|---|
|
Il n'y a pas de fichiers associés à ce document. |
|||

