000 | 04031cam a2200577Ii 4500 | ||
---|---|---|---|
001 | 9781351021708 | ||
003 | FlBoTFG | ||
005 | 20220711212850.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 190524s2019 flu ob 001 0 eng d | ||
040 |
_aOCoLC-P _beng _erda _epn _cOCoLC-P |
||
020 |
_a9781351021685 _q(electronic bk.) |
||
020 |
_a1351021680 _q(electronic bk.) |
||
020 |
_a9781351021708 _q(electronic bk.) |
||
020 |
_a1351021702 _q(electronic bk.) |
||
020 |
_a9781351021692 _q(electronic bk. : PDF) |
||
020 |
_a1351021699 _q(electronic bk. : PDF) |
||
020 |
_a9781351021678 _q(electronic bk. : Mobipocket) |
||
020 |
_a1351021672 _q(electronic bk. : Mobipocket) |
||
020 | _z9780815361459 | ||
020 | _z0815361459 | ||
035 | _a(OCoLC)1102416740 | ||
035 | _a(OCoLC-P)1102416740 | ||
050 | 4 |
_aQA76.9.A25 _bE466 2019eb |
|
072 | 7 |
_aCOM _x083000 _2bisacsh |
|
072 | 7 |
_aCOM _x000000 _2bisacsh |
|
072 | 7 |
_aCOM _x012040 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
072 | 7 |
_aUY _2bicssc |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 0 | 0 |
_aEmerging security algorithms and techniques / _ceditors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh. |
264 | 1 |
_aBoca Raton : _bTaylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, _c2019. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
520 | _aCyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption. There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 |
_aComputer security. _93970 |
|
650 | 0 |
_aData encryption (Computer science) _99168 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 7 |
_aCOMPUTERS / Security / Cryptography. _2bisacsh _920309 |
|
650 | 7 |
_aCOMPUTERS / General _2bisacsh _95150 |
|
650 | 7 |
_aCOMPUTERS / Computer Graphics / Game Programming & Design _2bisacsh _912289 |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh _96769 |
|
700 | 1 |
_aAhmad, Khaleel, _eeditor. _919374 |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781351021708 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 | _cEBK | ||
999 |
_c72351 _d72351 |