• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Emerging security algorithms and techniques /

پدید آورنده
editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.

موضوع
Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)

رده
QA76
.
9
.
A25
E466
2019eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1351021672
(Number (ISBN
1351021680
(Number (ISBN
1351021699
(Number (ISBN
1351021702
(Number (ISBN
9781351021678
(Number (ISBN
9781351021685
(Number (ISBN
9781351021692
(Number (ISBN
9781351021708
Erroneous ISBN
0815361459
Erroneous ISBN
9780815361459

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Emerging security algorithms and techniques /
General Material Designation
[Book]
First Statement of Responsibility
editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton :
Name of Publisher, Distributor, etc.
Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T & F Informa, plc,
Date of Publication, Distribution, etc.
2019.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

SUMMARY OR ABSTRACT

Text of Note
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption. There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Taylor & Francis
Stock Number
9781351021708

OTHER EDITION IN ANOTHER MEDIUM

Title
Emerging security algorithms and techniques.
International Standard Book Number
9780815361459

TOPICAL NAME USED AS SUBJECT

Computer security.
Cryptography.
Data encryption (Computer science)
Computer security.
COMPUTERS-- Computer Graphics-- Game Programming & Design.
COMPUTERS-- General.
COMPUTERS-- Security-- Cryptography.
COMPUTERS-- Security-- General.
Cryptography.
Data encryption (Computer science)

(SUBJECT CATEGORY (Provisional

COM-- 000000
COM-- 012040
COM-- 053000
COM-- 083000
UY

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
E466
2019eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Ahmad, Khaleel

ORIGINATING SOURCE

Date of Transaction
20200822134639.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival