
Theory and Practice of Cryptography and Network Security Protocols and Technologies
- 158 pages
- English
- PDF
- Available on iOS & Android
Theory and Practice of Cryptography and Network Security Protocols and Technologies
About this book
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Theory and Practice of Cryptography and Network Security Protocols and Technologies
- Contents
- Preface
- Chapter 1 Homomorphic Encryption — Theory and Application
- Chapter 2 Optical Communication with Weak Coherent Light Fields
- Chapter 3 Efficient Computation for Pairing Based Cryptography: A State of the Art
- Chapter 4 A Double Cipher Scheme for Applications in Ad Hoc Networks and its VLSI Implementations
- Chapter 5 Introduction to Quantum Cryptography