In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
EUR 23 expédition depuis Allemagne vers Etats-Unis
Destinations, frais et délaisVendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated. 80 pp. Englisch. N° de réf. du vendeur 9786138967415
Quantité disponible : 2 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26394695075
Quantité disponible : 4 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 401682044
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18394695081
Quantité disponible : 4 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Singh Dr. Vineet KumarDr. Vineet Kumar Singh awarded PhD in Computer Science Engineering from Mahrshi University of Information Technology, Lucknow, Mtech from AIET Gautam Budh Technical University, Lucknow, Btech from Institute of. N° de réf. du vendeur 559295035
Quantité disponible : Plus de 20 disponibles
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. Neuware -In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 80 pp. Englisch. N° de réf. du vendeur 9786138967415
Quantité disponible : 2 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated. N° de réf. du vendeur 9786138967415
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Evaluating Role of DNA and Kamla Approach in Metamorphic Cryptography | Vineet Kumar Singh (u. a.) | Taschenbuch | Englisch | 2021 | Scholars' Press | EAN 9786138967415 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. N° de réf. du vendeur 121148244
Quantité disponible : 5 disponible(s)