Cryptology Unlocked Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.
This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...
Cryptography: A Very Short Introduction
We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.
In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007 The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian... Making, Breaking Codes: Introduction to Cryptology
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
Post Quantum Cryptography Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... Wireless Security: Models, Threats, and Solutions REAL-WORLD WIRELESS SECURITY
This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to...
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
|Result Page: 4 3 2 1 |