Theory and Practice of Cryptography and Network Security Protocols and Technologies (Record no. 41349)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02046naaaa2200301uu 4500 |
| 001 - CONTROL NUMBER | |
| control field | https://directory.doabooks.org/handle/20.500.12854/66584 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220219201950.0 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 56823 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9789535111764 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9789535157298 |
| 024 7# - OTHER STANDARD IDENTIFIER | |
| Standard number or code | 10.5772/56823 |
| Terms of availability | doi |
| 041 0# - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | dc |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | UT |
| Source | bicssc |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Sen, Jaydip |
| Relationship | edt |
| 245 10 - TITLE STATEMENT | |
| Title | Theory and Practice of Cryptography and Network Security Protocols and Technologies |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | IntechOpen |
| Date of publication, distribution, etc. | 2013 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 electronic resource (158 p.) |
| 506 0# - RESTRICTIONS ON ACCESS NOTE | |
| Terms governing access | Open Access |
| Source of term | star |
| Standardized terminology for access restriction | Unrestricted online access |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities. |
| 540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE | |
| Terms governing use and reproduction | Creative Commons |
| Use and reproduction rights | https://creativecommons.org/licenses/by/3.0/ |
| Source of term | cc |
| -- | https://creativecommons.org/licenses/by/3.0/ |
| 546 ## - LANGUAGE NOTE | |
| Language note | English |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networking & communications |
| Source of heading or term | bicssc |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Network security |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Sen, Jaydip |
| Relationship | oth |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://mts.intechopen.com/storage/books/3412/authors_book/authors_book.pdf">https://mts.intechopen.com/storage/books/3412/authors_book/authors_book.pdf</a> |
| Access status | 0 |
| Public note | DOAB: download the publication |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://directory.doabooks.org/handle/20.500.12854/66584">https://directory.doabooks.org/handle/20.500.12854/66584</a> |
| Access status | 0 |
| Public note | DOAB: description of the publication |
No items available.
