000 04031cam a2200577Ii 4500
001 9781351021708
003 FlBoTFG
005 20220711212850.0
006 m o d
007 cr cnu---unuuu
008 190524s2019 flu ob 001 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781351021685
_q(electronic bk.)
020 _a1351021680
_q(electronic bk.)
020 _a9781351021708
_q(electronic bk.)
020 _a1351021702
_q(electronic bk.)
020 _a9781351021692
_q(electronic bk. : PDF)
020 _a1351021699
_q(electronic bk. : PDF)
020 _a9781351021678
_q(electronic bk. : Mobipocket)
020 _a1351021672
_q(electronic bk. : Mobipocket)
020 _z9780815361459
020 _z0815361459
035 _a(OCoLC)1102416740
035 _a(OCoLC-P)1102416740
050 4 _aQA76.9.A25
_bE466 2019eb
072 7 _aCOM
_x083000
_2bisacsh
072 7 _aCOM
_x000000
_2bisacsh
072 7 _aCOM
_x012040
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUY
_2bicssc
082 0 4 _a005.8
_223
245 0 0 _aEmerging security algorithms and techniques /
_ceditors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
264 1 _aBoca Raton :
_bTaylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc,
_c2019.
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _aCyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption. There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
_93970
650 0 _aData encryption (Computer science)
_99168
650 0 _aCryptography.
_91973
650 7 _aCOMPUTERS / Security / Cryptography.
_2bisacsh
_920309
650 7 _aCOMPUTERS / General
_2bisacsh
_95150
650 7 _aCOMPUTERS / Computer Graphics / Game Programming & Design
_2bisacsh
_912289
650 7 _aCOMPUTERS / Security / General
_2bisacsh
_96769
700 1 _aAhmad, Khaleel,
_eeditor.
_919374
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781351021708
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _cEBK
999 _c72351
_d72351