語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Multidisciplinary perspectives in cr...
~
Al Maliky, Sattar B. Sadkhan, (1954-)
FindBook
Google Book
Amazon
博客來
Multidisciplinary perspectives in cryptology and information security /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Multidisciplinary perspectives in cryptology and information security // Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, editors.
其他作者:
Al Maliky, Sattar B. Sadkhan,
面頁冊數:
PDFs (443 pages).
內容註:
Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova -- Quantum key distribution networks / Sufyan T. Faraj Al-Janabi -- Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad -- Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel -- Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad -- Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi -- ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong -- RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi -- Cryptographic key distribution and management / Martin Rublik -- New developments in quasigroup-based cryptography / Aleksandra Mileva -- Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso -- Biometrics: identification and security / Muzhir Shaban Al-Ani -- Routing based on security / I. A. Almerhag -- Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
標題:
Data encryption (Computer science) -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
ISBN:
9781466658097 (ebook)
Multidisciplinary perspectives in cryptology and information security /
Multidisciplinary perspectives in cryptology and information security /
Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, editors. - PDFs (443 pages).
Includes bibliographical references.
Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova -- Quantum key distribution networks / Sufyan T. Faraj Al-Janabi -- Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad -- Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel -- Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad -- Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi -- ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong -- RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi -- Cryptographic key distribution and management / Martin Rublik -- New developments in quasigroup-based cryptography / Aleksandra Mileva -- Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso -- Biometrics: identification and security / Muzhir Shaban Al-Ani -- Routing based on security / I. A. Almerhag -- Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
Restricted to subscribers or individual electronic text purchasers.
"This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466658097 (ebook)
Standard No.: 10.4018/978-1-4666-5808-0doi
LCCN: 2014011686Subjects--Topical Terms:
579162
Data encryption (Computer science)
Subjects--Index Terms:
Cryptanalysis
LC Class. No.: QA76.9.A25 / M846 2014e
Dewey Class. No.: 005.8/2
Multidisciplinary perspectives in cryptology and information security /
LDR
:03416nmm a2200433 i 4500
001
2000089
003
IGIG
005
20140627134834.0
008
151126s2014 pau fob 000 0 eng d
010
$a
2014011686
020
$a
9781466658097 (ebook)
020
$a
9781466658080
$q
print
020
$a
9781466658110
$q
print & perpetual access
024
7
$a
10.4018/978-1-4666-5808-0
$2
doi
035
$a
(CaBNVSL)gtp00559705
035
$a
(OCoLC)881881468
035
$a
00000222
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
QA76.9.A25
$b
M846 2014e
082
0 4
$a
005.8/2
$2
23
245
0 0
$a
Multidisciplinary perspectives in cryptology and information security /
$c
Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, editors.
264
1
$a
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) :
$b
IGI Global,
$c
[2014]
300
$a
PDFs (443 pages).
336
$a
text
$2
rdacontent
337
$a
electronic
$2
isbdmedia
338
$a
online resource
$2
rdacarrier
504
$a
Includes bibliographical references.
505
0
$a
Multidisciplinary in cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- Soft computing-based information security / Eva Volna, Tomas Sochor, Clyde Meli, Zuzana Kominkova Oplatkova -- Quantum key distribution networks / Sufyan T. Faraj Al-Janabi -- Chaos-based cryptography for voice secure wireless communication / Sattar B. Sadkhan Al Maliky, Rana Saad -- Cryptography based on error correcting codes: a survey / Marek Repka, Pierre-Louis Cayrel -- Fuzzy logic-based security evaluation of stream cipher / Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad -- Information security-based nano- and bio-cryptography / W. K. Hamoudi, Nadia M. G. Al-Saidi -- ICA and PCA-based cryptology / Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas -- An area-efficient composite field inverter for elliptic curve cryptosystems / M. M. Wong, M. L. D. Wong -- RSA-public key cryptosystems based on quadratic equations in finite field / Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi -- Cryptographic key distribution and management / Martin Rublik -- New developments in quasigroup-based cryptography / Aleksandra Mileva -- Influence of the intra-modal facial information for an identification approach / Carlos M. Travieso, Marcos del Pozo-Baños, Jaime R. Ticay-Rivas, Jesus B. Alonso -- Biometrics: identification and security / Muzhir Shaban Al-Ani -- Routing based on security / I. A. Almerhag -- Forensic analysis, cryptosystem implementation, and cryptology: methods and techniques for extracting encryption keys from volatile memory / Stefan Balogh.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Wireless communication systems
$x
Security measures.
$3
590463
650
0
$a
Computer networks
$x
Security measures.
$3
579161
653
$a
Cryptanalysis
653
$a
Cryptography
653
$a
Cryptology
653
$a
Information security
653
$a
Multidisciplinary applications
700
1
$a
Al Maliky, Sattar B. Sadkhan,
$d
1954-
$e
editor.
$3
2143228
700
1
$a
Abbas, Nidaa A.,
$e
editor.
$3
2143229
710
2
$a
IGI Global,
$e
publisher.
$3
2142982
776
0
$c
(Original)
$w
(DLC)2014011686
776
0 8
$i
Print version:
$z
1466658088
$z
9781466658080
$w
(DLC) 2014011686
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5808-0
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9269451
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 M846 2014e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入