Back to Search results for [ subject:"Cryptography" ]

Multidisciplinary perspectives in cr...
Abbas, Nidaa A.

 

  • Multidisciplinary perspectives in cryptology and information security
  • Record Type: Language materials, printed : monographic
    Secondary Intellectual Responsibility: AbbasNidaa A.,
    Secondary Intellectual Responsibility: Al MalikySattar B. Sadkhan, 1954-
    Secondary Intellectual Responsibility: IGI Global
    Description: PDFs (443 pages).
    Subject: Computer networks - Security measures. -
    Subject: Wireless communication systems - Security measures. -
    Subject: Data encryption (Computer science) -
    Subject: Cryptanalysis
    Subject: Cryptography
    Subject: Cryptology
    Subject: Information security
    Subject: Multidisciplinary applications
    Online resource: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
    Notes: Content Type: text
    Summary: "This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions"--Provided by publisher.
    ISBN: 9781466658097
    Content Note: Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova Quantum key distribution networks / Sufyan T. Faraj Al-Janabi Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi Cryptographic key distribution and management / Martin Rublik New developments in quasigroup-based cryptography / Aleksandra Mileva Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso Biometrics: identification and security / Muzhir Shaban Al-Ani Routing based on security / I. A. Almerhag Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login