語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Multidisciplinary perspectives in cr...
~
Abbas, Nidaa A.
Multidisciplinary perspectives in cryptology and information security
紀錄類型:
書目-語言資料,印刷品 : 單行本
其他作者:
AbbasNidaa A.,
其他作者:
Al MalikySattar B. Sadkhan, 1954-
其他團體作者:
IGI Global
面頁冊數:
PDFs (443 pages).
標題:
Computer networks - Security measures. -
標題:
Wireless communication systems - Security measures. -
標題:
Data encryption (Computer science) -
標題:
Cryptanalysis
標題:
Cryptography
標題:
Cryptology
標題:
Information security
標題:
Multidisciplinary applications
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
附註:
Content Type: text
摘要註:
"This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions"--Provided by publisher.
ISBN:
9781466658097
內容註:
Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova Quantum key distribution networks / Sufyan T. Faraj Al-Janabi Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi Cryptographic key distribution and management / Martin Rublik New developments in quasigroup-based cryptography / Aleksandra Mileva Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso Biometrics: identification and security / Muzhir Shaban Al-Ani Routing based on security / I. A. Almerhag Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
Multidisciplinary perspectives in cryptology and information security
Multidisciplinary perspectives in cryptology and information security
/ Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, editors. - PDFs (443 pages)..
Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas.
Content Type: textMedia type: electronicCarrier type: online resourceRestricted to subscribers or individual electronic text purchasers..
Includes bibliographical references..
ISBN 9781466658097ISBN 9781466658080ISBN 9781466658110
Computer networksWireless communication systemsData encryption (Computer science) -- Security measures. -- Security measures.
CryptanalysisCryptographyCryptologyInformation securityMultidisciplinary applications
Abbas, Nidaa A.
Multidisciplinary perspectives in cryptology and information security
LDR
:03266nam a2200433 450
001
288653
005
20140627134834.0
009
a(CaBNVSL)gtp00559705
009
a(OCoLC)881881468
009
00000222
010
1
$a
9781466658097
$b
ebook
010
1
$a
9781466658080
010
1
$a
9781466658110
012
0
$a
10.4018/978-1-4666-5808-0
020
$b
2014011686
100
$a
20151127d2014 y0engy50 b
102
$a
us
105
$a
y a 000yy
200
1
$a
Multidisciplinary perspectives in cryptology and information security
$f
Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, editors.
215
1
$a
PDFs (443 pages).
300
$a
Content Type: text
300
$a
Media type: electronic
300
$a
Carrier type: online resource
300
$a
Restricted to subscribers or individual electronic text purchasers.
301
$a
10.4018/978-1-4666-5808-0
310
$a
Also available in print.
320
$a
Includes bibliographical references.
327
1
$a
Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas
$a
Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova
$a
Quantum key distribution networks / Sufyan T. Faraj Al-Janabi
$a
Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad
$a
Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel
$a
Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad
$a
Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi
$a
ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas
$a
An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong
$a
RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi
$a
Cryptographic key distribution and management / Martin Rublik
$a
New developments in quasigroup-based cryptography / Aleksandra Mileva
$a
Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso
$a
Biometrics: identification and security / Muzhir Shaban Al-Ani
$a
Routing based on security / I. A. Almerhag
$a
Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
330
$a
"This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2014011686
452
1
$1
300
$a
Print version:
$1
001(DLC) 2014011686
$1
0101
$a
1466658088; 9781466658080
606
$a
Computer networks
$x
Security measures.
$2
lc
$3
385022
606
$a
Wireless communication systems
$x
Security measures.
$2
lc
$3
385062
606
$a
Data encryption (Computer science)
$3
64194
610
1
$a
Cryptanalysis
610
1
$a
Cryptography
610
1
$a
Cryptology
610
1
$a
Information security
610
1
$a
Multidisciplinary applications
676
$a
005.8/2
$v
23
680
$a
QA76.9.A25
$b
M846 2014e
702
1
$a
Abbas
$b
Nidaa A.
$4
editor.
$3
385086
702
1
$a
Al Maliky
$b
Sattar B. Sadkhan
$f
1954-
$4
editor.
$3
385085
712
0 2
$a
IGI Global
$4
publisher.
$3
384552
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入