Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in todays digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more i...Lasīt vairāk
A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans....Lasīt vairāk
This text illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. It enables students to run their own programs and develop a deep and solid understanding of the mechanics of cryptography. The aut...Lasīt vairāk
This useful handbook elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic votin...Lasīt vairāk
Group theory appears to be a promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using groups, including in particular non-Abelian groups, in the field of cryptogr...Lasīt vairāk
This book presents essential principles, technical information, and expert insights on multimedia security technology. It also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniqu...Lasīt vairāk
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols....Lasīt vairāk
The book is a one-stop source for cryptographic methods used in payment technologies in major global markets: legacy magnetic stripe (e.g., EMV, 3DS 2.0, DUKPT). It provides a broad overview of the relevant cryptographic algorithms and methods, putt...Lasīt vairāk
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers....Lasīt vairāk
The text covers concepts of cyber security through quantum computing and quantum cryptography in a single volume. It will be a useful text for graduate students, academic researchers, and professionals in areas including electrical and electronics e...Lasīt vairāk
Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising and cellular location data....Lasīt vairāk
This book seeks to generalize techniques and experiences in designing and analyzing cryptographic schemes for blockchain. In addition, it covers surveys of research objects, reviews of cryptographic schemes, lectures and methodologies to practice cr...Lasīt vairāk
This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirem...Lasīt vairāk
Encryption and processing of digital data at every stage is vital due for its security. This work covers various topics ranging from digital data encryption algorithms, hybrid encryption algorithm, evaluation matrices, efficient data transmission fo...Lasīt vairāk
Maintaining a practical perspective along with theoretical explanations, this book explores the concepts, discussion, analysis of techniques and tools about what are the policy standards, what are vulnerabilities, how to patch them, how to transmit...Lasīt vairāk
CryptoWars offers a history of the half century contest between the US government and its citizens to control digital cryptography, a technology allowing citizens to place their communications beyond the States reach, thus undermining law enforcemen...Lasīt vairāk
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. ...Lasīt vairāk