Cryptography and Its Applications in Information Security
Material type:
- text
- computer
- online resource
- 9783036537672
- 9783036537689
- books978-3-0365-3768-9
- History of engineering & technology
- Technology: general issues
- 3D chebyshev
- asymmetric
- asymmetric algorithm
- authorization model
- bit independence
- bit independence criterion
- blockchain
- chaos-based stream cipher
- communication
- complexity
- computationally biased
- coupled map lattice
- cryptography
- digital cash
- digital copyright management
- federated learning
- FPGA
- framework
- homomorphic encryption
- intermittent jumping
- intrusion detection systems
- limited computational power
- logistic
- machine learning
- multi-chaos
- museum
- n/a
- performance
- privacy
- privacy preserving
- public key exchange
- RC4
- security
- skew-tent
- smart contract
- SPCNG
- stream cipher
Open Access Unrestricted online access star
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue "Cryptography and Its Applications in Information Security" addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.
Creative Commons https://creativecommons.org/licenses/by/4.0/ cc
https://creativecommons.org/licenses/by/4.0/
English
There are no comments on this title.