Limit search to available items
Book Cover
E-book

Title Applied cryptography for cyber security and defense : information encryption and cyphering / Hamid R. Nemati and Li Yang, editors
Published Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2011

Copies

Description electronic texts (337 pages : illustrations) : digital files
Contents 1. Network security / Ramakrishna Thurimella, Leemon Baird -- 2. Cryptography-based authentication for protecting cyber systems / Xunhua Wang, Hua Lin -- 3. E-mail, Web service and cryptography / Wasim Al-Hamdani -- 4. Cryptography in e-mail and Web services / Wasim Al-Hamdani -- 5. Applied cryptography in e-mail services and Web services / Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang -- 6. Applied cryptography in wireless sensor networks / Dulal Kar, Hung Ngo, Clifton Mulkey -- 7. Applied cryptography in infrastructure-free wireless networks / Lei Zhang, Chih-Cheng Chang, Danfeng Yao -- 8. Applied cryptography in electronic commerce / Slawomir Grzonkowski, Brian Ensor, Bill McDaniel -- 9. An electronic contract signing protocol using fingerprint biometrics / Harkeerat Bedi, Li Yang, Joseph Kizza -- 10. Secure and private service discovery in pervasive computing environments / Feng Zhu, Wei Zhu -- 11. Multimedia information security / Ming Yang, Monica Trifas, Nikolaos Bourbakis, Lei Chen -- 12. Secure electronic voting with cryptography / Xunhua Wang, Ralph Grove, M. Heydari -- 13. Biometric security in the E-world / Kunal Sharma, A.J. Singh
Summary "This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher
Analysis Network security
Cryptography-based authentication
E-mail services and Web services
Wireless sensor networks
E-commerce
Pervasive computing environments
Steganography
Secure electronic voting
Biometric security
Applied cryptography
Bibliography Includes bibliographical references
Notes Also available in print
Mode of access: Internet
Title screen (IGI Global, viewed Nov. 15, 2010)
Subject Telecommunication -- Security measures.
Data encryption (Computer science)
Cryptography
Cryptography.
Data encryption (Computer science)
Telecommunication -- Security measures.
Form Electronic book
Author Nemati, Hamid R., 1958-
Yang, Li, 1974 October 29-
IGI Global.
LC no. 2009052433
ISBN 9781615207848
1615207848