Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Multidisciplinary perspectives in cr...
~
Abbas, Nidaa A.,
Multidisciplinary perspectives in cryptology and information security /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Multidisciplinary perspectives in cryptology and information security /Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, editors.
other author:
Al Maliky, Sattar B. Sadkhan,
Description:
PDFs (443 pages).
Subject:
Data encryption (Computer science)
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
ISBN:
9781466658097 (ebook)
Multidisciplinary perspectives in cryptology and information security /
Multidisciplinary perspectives in cryptology and information security /
Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, editors. - PDFs (443 pages).
Includes bibliographical references.
Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova -- Quantum key distribution networks / Sufyan T. Faraj Al-Janabi -- Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad -- Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel -- Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad -- Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi -- ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong -- RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi -- Cryptographic key distribution and management / Martin Rublik -- New developments in quasigroup-based cryptography / Aleksandra Mileva -- Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso -- Biometrics: identification and security / Muzhir Shaban Al-Ani -- Routing based on security / I. A. Almerhag -- Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
Restricted to subscribers or individual electronic text purchasers.
"This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466658097 (ebook)
Standard No.: 10.4018/978-1-4666-5808-0doi
LCCN: 2014011686Subjects--Topical Terms:
184520
Data encryption (Computer science)
Subjects--Index Terms:
Cryptanalysis
LC Class. No.: QA76.9.A25 / M846 2014e
Dewey Class. No.: 005.8/2
Multidisciplinary perspectives in cryptology and information security /
LDR
:03416nmm a2200433 i 4500
001
464533
003
IGIG
005
20140627134834.0
008
151130s2014 pau fob 000 0 eng d
010
$a
2014011686
020
$a
9781466658097 (ebook)
020
$a
9781466658080$qprint
020
$a
9781466658110$qprint & perpetual access
024
7
$a
10.4018/978-1-4666-5808-0
$2
doi
035
$a
(CaBNVSL)gtp00559705
035
$a
(OCoLC)881881468
035
$a
00000222
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
QA76.9.A25
$b
M846 2014e
082
0 4
$a
005.8/2
$2
23
245
0 0
$a
Multidisciplinary perspectives in cryptology and information security /
$c
Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, editors.
264
1
$a
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) :
$b
IGI Global,
$c
[2014]
300
$a
PDFs (443 pages).
336
$a
text
$2
rdacontent
337
$a
electronic
$2
isbdmedia
338
$a
online resource
$2
rdacarrier
504
$a
Includes bibliographical references.
505
0
$a
Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova -- Quantum key distribution networks / Sufyan T. Faraj Al-Janabi -- Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad -- Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel -- Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad -- Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi -- ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong -- RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi -- Cryptographic key distribution and management / Martin Rublik -- New developments in quasigroup-based cryptography / Aleksandra Mileva -- Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso -- Biometrics: identification and security / Muzhir Shaban Al-Ani -- Routing based on security / I. A. Almerhag -- Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Wireless communication systems
$x
Security measures.
$3
208191
650
0
$a
Computer networks
$x
Security measures.
$3
185597
653
$a
Cryptanalysis
653
$a
Cryptography
653
$a
Cryptology
653
$a
Information security
653
$a
Multidisciplinary applications
700
1
$a
Al Maliky, Sattar B. Sadkhan,
$d
1954-
$e
editor.
$3
717919
700
1
$a
Abbas, Nidaa A.,
$e
editor.
$3
717920
710
2
$a
IGI Global,
$e
publisher.
$3
717658
776
0
$c
(Original)
$w
(DLC)2014011686
776
0 8
$i
Print version:
$z
1466658088
$z
9781466658080
$w
(DLC) 2014011686
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000113555
電子館藏
1圖書
電子書
EB QA76.9.A25 M846 c2014
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login