Vendeur : Anybook.com, Lincoln, Royaume-Uni
EUR 34,42
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. Volume 354. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,950grams, ISBN:9783642205415.
Edité par LAP LAMBERT Academic Publishing, 2022
ISBN 10 : 6139460395 ISBN 13 : 9786139460397
Langue: anglais
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 45,46
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New.
Edité par LAP LAMBERT Academic Publishing Apr 2022, 2022
ISBN 10 : 6139460395 ISBN 13 : 9786139460397
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 43,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence.Books on Demand GmbH, Überseering 33, 22297 Hamburg 60 pp. Englisch.
Edité par LAP LAMBERT Academic Publishing Mär 2024, 2024
ISBN 10 : 6207470397 ISBN 13 : 9786207470396
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 79,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -IoT devices we use every day are becoming interconnected entities across the planet. They comprise autonomous embedded sensory objects that are resource-constrained in terms of computing capabilities, energy, and memory capacities. Moreover, these devices can be affected by various security threats. This requires the design of new cryptographic methods that are efficient in terms of security, time overhead, and energy consumption. To address these challenges, particularly in terms of security, chaos-based cryptographic primitives have been developed in this thesis. First, we implemented and evaluated the statistical security and hardware metrics of certain chaotic maps on the FPGA board. Then, we designed, implemented, and analyzed four secure PRNGs-CS and their corresponding stream ciphers. Finally, we designed, implemented, and evaluated the performance of a new chaos-based encryption/decryption architecture. The experimental results demonstrate the high degree of security and the good hardware metrics achieved by the proposed chaotic systems, making them suitable for securing sensitive data.Books on Demand GmbH, Überseering 33, 22297 Hamburg 200 pp. Englisch.
Edité par LAP LAMBERT Academic Publishing, 2024
ISBN 10 : 6207470397 ISBN 13 : 9786207470396
Langue: anglais
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
EUR 131,34
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierpaperback. Etat : New. New. book.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 167,75
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 157,97
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Edité par Springer Berlin Heidelberg, 2016
ISBN 10 : 366250653X ISBN 13 : 9783662506530
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 160,49
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Edité par Springer Berlin Heidelberg, 2011
ISBN 10 : 3642205410 ISBN 13 : 9783642205415
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 160,49
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Edité par Springer Berlin Heidelberg, Springer Berlin Heidelberg Jun 2011, 2011
ISBN 10 : 3642205410 ISBN 13 : 9783642205415
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 160,49
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierBuch. Etat : Neu. Neuware -Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics.The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 408 pp. Englisch.
Edité par Springer Berlin Heidelberg, Springer Berlin Heidelberg Aug 2016, 2016
ISBN 10 : 366250653X ISBN 13 : 9783662506530
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 160,49
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics.The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 408 pp. Englisch.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 167,74
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 170,06
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 195,68
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. 408.
EUR 191,63
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 195,18
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
EUR 202,04
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 156,79
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 157,19
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 230,41
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Edité par Springer-Verlag New York Inc, 2011
ISBN 10 : 3642205410 ISBN 13 : 9783642205415
Langue: anglais
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 234,16
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierHardcover. Etat : Brand New. 400 pages. 9.00x6.00x1.00 inches. In Stock.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 247
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
EUR 237,37
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Like New. Like New. book.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 272,29
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Edité par LAP LAMBERT Academic Publishing, 2022
ISBN 10 : 6139460395 ISBN 13 : 9786139460397
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 35,62
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Murugesan JaishreeI am M. Jaishree working as Assistant Professor at SKCT. Currently doing research in the area of Wireless communication and Networking. Completed Master degree at KCT. Undergraduate at VLBJCET.Images are often u.
Edité par LAP LAMBERT Academic Publishing, 2022
ISBN 10 : 6139460395 ISBN 13 : 9786139460397
Langue: anglais
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 45,63
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. Print on Demand.
Edité par LAP LAMBERT Academic Publishing Apr 2022, 2022
ISBN 10 : 6139460395 ISBN 13 : 9786139460397
Langue: anglais
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 43,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence. 60 pp. Englisch.
Edité par LAP LAMBERT Academic Publishing, 2022
ISBN 10 : 6139460395 ISBN 13 : 9786139460397
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 44,59
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence.
Edité par LAP LAMBERT Academic Publishing, 2022
ISBN 10 : 6139460395 ISBN 13 : 9786139460397
Langue: anglais
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 48,48
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. PRINT ON DEMAND.
Edité par LAP LAMBERT Academic Publishing Mrz 2024, 2024
ISBN 10 : 6207470397 ISBN 13 : 9786207470396
Langue: anglais
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 79,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware 200 pp. Englisch.