Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    "Applied Cryptography and Network Security" ed. by Jaydip Sen

    Posted By: exLib
    "Applied Cryptography and Network Security" ed. by Jaydip Sen

    "Applied Cryptography and Network Security" ed. by Jaydip Sen
    InTeOpP | 2012 | ISBN: 9535102184 9789535102182 | 388 pages | PDF | 16 MB

    The purpose of this book is to present some of the critical security challenges in today’s communication networks and computing and to provide insights to possible mechanisms to defend against attacks. With this objective, the book provides a collection of research work in the field of cryptography and network security by some experts in these areas.

    The book contains 16 chapters which are divided into three parts.
    The chapters in Part 1 of the book largely deal with security and privacy issues in computing and communication networks.
    The Part 2 includes chapters which are related to the field of quantum cryptography.
    The chapters dealing with the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography are included in the Part 3 of the book.

    Contents
    Preface
    Part 1: Security and Privacy in Computing and Communication Networks
    1 Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
    2 Security from Location
    3 Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview
    4 Security Approaches for Information-Centric Networking
    5 Secure Platform Over Wireless Sensor Networks
    6 Privacy-Secure Digital Watermarking for Fair Content Trading
    7 NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks
    8 Key Establishment Protocol for Wireless Sensor Networks
    Part 2: Quantum Cryptography
    9 Quantum Cryptography
    10 Quantum Key Management
    11 Securing a Telecom Services Using Quantum Cryptographic Mechanisms
    Part 3: Evolutionary Concepts and Techniques in Security
    12 Notions of Chaotic Cryptography: Sketch of a Chaos Based Cryptosystem
    13 Chaotic Electronic Circuits in Cryptography
    14 An En/Decryption Machine Based on Statistical Physics
    15 Modern Technologies Used for Security of Software Applications
    16 Research on DNA Cryptography
    with TOC BookMarkLinks
    NitroF • | • UpCh
    RGator • | • UlNet • | • DepositF

    HiFi • | • SiBi • | • TuBi