Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue "Cryptography and Its Applications in Information Security" addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 44482702-n
Quantité disponible : Plus de 20 disponibles
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
Hardback or Cased Book. Etat : New. Cryptography and Its Applications in Information Security. Book. N° de réf. du vendeur BBS-9783036537672
Quantité disponible : 5 disponible(s)
Vendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9783036537672
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
HRD. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L1-9783036537672
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
HRD. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L1-9783036537672
Quantité disponible : Plus de 20 disponibles
Vendeur : killarneybooks, Inagh, CLARE, Irlande
Hardcover. Etat : Near Fine. 1st Edition. Hardcover, vii + 191 pages, NOT ex-library. Minor handling wear, likely unread. Book is clean and bright with unmarked text, free of inscriptions and stamps, firmly bound. Issued without a dust jacket. -- The book explores contemporary cryptographic methods and their critical roles in safeguarding digital information. It presents research on innovative encryption techniques and their real-world implementations. Covering a wide range of topics, from homomorphic encryption in privacy-preserving federated learning to blockchain-based authorisation for digital property rights, the book delves into both theoretical advancements and practical solutions. It includes studies on intrusion detection using image-based techniques, novel stream ciphers based on chaotic systems, and digital cash systems using e-coins. Furthermore, the book highlights the mathematical foundations of cryptographic protocols, such as the Bit Independence Criterion and strongly asymmetric public key agreements, and illustrates how these principles are used to enhance data security. By addressing current challenges in digital encryption, intrusion detection, and data protection, this work contributes significantly to the ongoing development of secure communication systems. It is an essential resource for researchers, professionals, and students seeking to understand the evolving landscape of cryptography and its applications in fields such as cybersecurity, privacy, and data management. -- Contents: Special Issue on Cryptography and Its Applications in Information Security; Privacy-Preserving Federated Learning Using Homomorphic Encryption / Jaehyoung Park & Hyuk Lim; Intrusion Detection Based on Gray-Level Co-Occurrence Matrix and 2D Dispersion Entropy / Gianmarco Baldini, Jose Luis Hernandez Ramos & Irene Amerini; New Subclass Framework and Concrete Examples of Strongly Asymmetric Public Key Agreement / Satoshi Iriyama, Koki Jimbo & Massimo Regoli; Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator / Fethi Dridi, Safwan El Assad, Wajih El Hadj Youssef & Mohsen Machout; Bit Independence Criterion Extended to Stream Ciphers / Evaristo José Madarro Capó, Carlos Miguel Legón-Pérez, Omar Rojas, Guillermo Sosa-Gómez & Raisa Socorro Llanes; A Novel Intermittent Jumping Coupled Map Lattice Based on Multiple Chaotic Maps / Rong Huang, Fang Han, Xiaojuan Liao, Zhijie Wang & Aihua Dong; A Digital Cash Paradigm with Valued and No-Valued e-Coins / Ricard Borges and Francesc Sebé; Authorization Mechanism Based on Blockchain Technology for Protecting Museum: Digital Property Rights / Yun-Ciao Wang, Chin-Ling Chen & Yong-Yuan Deng. N° de réf. du vendeur 010792
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 44482702
Quantité disponible : Plus de 20 disponibles
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9783036537672_new
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 44482702-n
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 44482702
Quantité disponible : Plus de 20 disponibles