語系/ Language: 繁體中文
回首頁 到查詢結果 [ subject:"Information security" ]

Multidisciplinary perspectives in cr...
Abbas, Nidaa A.

 

  • Multidisciplinary perspectives in cryptology and information security
  • 紀錄類型: 書目-語言資料,印刷品 : 單行本
    其他作者: AbbasNidaa A.,
    其他作者: Al MalikySattar B. Sadkhan, 1954-
    其他團體作者: IGI Global
    面頁冊數: PDFs (443 pages).
    標題: Computer networks - Security measures. -
    標題: Wireless communication systems - Security measures. -
    標題: Data encryption (Computer science) -
    標題: Cryptanalysis
    標題: Cryptography
    標題: Cryptology
    標題: Information security
    標題: Multidisciplinary applications
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
    附註: Content Type: text
    摘要註: "This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions"--Provided by publisher.
    ISBN: 9781466658097
    內容註: Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova Quantum key distribution networks / Sufyan T. Faraj Al-Janabi Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi Cryptographic key distribution and management / Martin Rublik New developments in quasigroup-based cryptography / Aleksandra Mileva Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso Biometrics: identification and security / Muzhir Shaban Al-Ani Routing based on security / I. A. Almerhag Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
多媒體
評論
  • 新增評論 分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
 
 
變更密碼
登入