Feedback

X
Cryptography and Its Applications in Information Security

Cryptography and Its Applications in Information Security

0 Ungluers have Faved this Work
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 53 times via unglue.it ebook links.
  1. 53 - pdf (CC BY) at Unglue.it.

Keywords

  • 3D chebyshev
  • asymmetric
  • asymmetric algorithm
  • authorization model
  • bit independence
  • bit independence criterion
  • blockchain
  • chaos-based stream cipher
  • Communication
  • complexity
  • computationally biased
  • coupled map lattice
  • Cryptography
  • digital cash
  • digital copyright management
  • federated learning
  • FPGA
  • framework
  • History of engineering & technology
  • homomorphic encryption
  • intermittent jumping
  • intrusion detection systems
  • limited computational power
  • logistic
  • Machine learning
  • multi-chaos
  • museum
  • n/a
  • Performance
  • privacy
  • privacy preserving
  • public key exchange
  • RC4
  • security
  • skew-tent
  • smart contract
  • SPCNG
  • stream cipher
  • Technology, engineering, agriculture
  • Technology: general issues

Links

DOI: 10.3390/books978-3-0365-3768-9

Editions

edition cover

Share

Copy/paste this into your site: