Description |
electronic texts (337 pages : illustrations) : digital files |
Contents |
1. Network security / Ramakrishna Thurimella, Leemon Baird -- 2. Cryptography-based authentication for protecting cyber systems / Xunhua Wang, Hua Lin -- 3. E-mail, Web service and cryptography / Wasim Al-Hamdani -- 4. Cryptography in e-mail and Web services / Wasim Al-Hamdani -- 5. Applied cryptography in e-mail services and Web services / Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang -- 6. Applied cryptography in wireless sensor networks / Dulal Kar, Hung Ngo, Clifton Mulkey -- 7. Applied cryptography in infrastructure-free wireless networks / Lei Zhang, Chih-Cheng Chang, Danfeng Yao -- 8. Applied cryptography in electronic commerce / Slawomir Grzonkowski, Brian Ensor, Bill McDaniel -- 9. An electronic contract signing protocol using fingerprint biometrics / Harkeerat Bedi, Li Yang, Joseph Kizza -- 10. Secure and private service discovery in pervasive computing environments / Feng Zhu, Wei Zhu -- 11. Multimedia information security / Ming Yang, Monica Trifas, Nikolaos Bourbakis, Lei Chen -- 12. Secure electronic voting with cryptography / Xunhua Wang, Ralph Grove, M. Heydari -- 13. Biometric security in the E-world / Kunal Sharma, A.J. Singh |
Summary |
"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher |
Analysis |
Network security |
|
Cryptography-based authentication |
|
E-mail services and Web services |
|
Wireless sensor networks |
|
E-commerce |
|
Pervasive computing environments |
|
Steganography |
|
Secure electronic voting |
|
Biometric security |
|
Applied cryptography |
Bibliography |
Includes bibliographical references |
Notes |
Also available in print |
|
Mode of access: Internet |
|
Title screen (IGI Global, viewed Nov. 15, 2010) |
Subject |
Telecommunication -- Security measures.
|
|
Data encryption (Computer science)
|
|
Cryptography
|
|
Cryptography.
|
|
Data encryption (Computer science)
|
|
Telecommunication -- Security measures.
|
Form |
Electronic book
|
Author |
Nemati, Hamid R., 1958-
|
|
Yang, Li, 1974 October 29-
|
|
IGI Global.
|
LC no. |
2009052433 |
ISBN |
9781615207848 |
|
1615207848 |
|