Introductory Chapter: Recent Advances in Cryptography and Network Security

Introductory Chapter: Recent Advances in Cryptography and Network Security
Author: Pinaki Mitra
Publisher:
Total Pages:
Release: 2018
Genre: Computers
ISBN:


Download Introductory Chapter: Recent Advances in Cryptography and Network Security Book in PDF, Epub and Kindle

Introductory Chapter: Recent Advances in Cryptography and Network Security.


Introductory Chapter: Recent Advances in Cryptography and Network Security
Language: en
Pages:
Authors: Pinaki Mitra
Categories: Computers
Type: BOOK - Published: 2018 - Publisher:

GET EBOOK

Introductory Chapter: Recent Advances in Cryptography and Network Security.
Recent Advances in Cryptography and Network Security
Language: en
Pages: 70
Authors: Pinaki Mitra
Categories: Computers
Type: BOOK - Published: 2018-10-31 - Publisher: BoD – Books on Demand

GET EBOOK

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography a
Introduction to Network Security
Language: en
Pages: 439
Authors: Jie Wang
Categories: Computers
Type: BOOK - Published: 2015-10-05 - Publisher: John Wiley & Sons

GET EBOOK

Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer t
Introduction to Cryptography
Language: en
Pages: 315
Authors: Hans Delfs
Categories: Computers
Type: BOOK - Published: 2012-12-06 - Publisher: Springer Science & Business Media

GET EBOOK

This book covers key concepts of cryptography, from encryption and digital signatures to cryptographic protocols, presenting techniques and protocols for key ex
Introduction to Cryptography
Language: en
Pages: 286
Authors: Johannes Buchmann
Categories: Mathematics
Type: BOOK - Published: 2012-12-06 - Publisher: Springer Science & Business Media

GET EBOOK

Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users shou