Listing 1 - 10 of 72 | << page >> |
Sort by
|
Choose an application
Proposed 35 years ago, quantum cryptography (QC) and its most prominent part quantum key distribution (QKD) attracts more and more attention. Significant progress has been made in both its theory and practice from many points of view. The present book has four exclusive chapters. All chapters are focused on QC and QKD applications in advanced telecommunication networks: classical fiber optic lines with a constant increase in the range of quantum communication channels and duration of the connection; software-defined optical networks; free-space optical communication systems; and systems with elements of holographic processing. The book will be useful for researchers, engineers, and doctoral students working in areas of QC, QKD, and related areas of information security.
Choose an application
Despite being 2000 years old, cryptography is still a very active field of research. New needs and application fields, like privacy, the Internet of Things (IoT), physically unclonable functions (PUFs), post-quantum cryptography, and quantum key distribution, will keep fueling the work in this field. This book discusses quantum cryptography, lightweight cryptography for IoT, PUFs, cryptanalysis, and more. It provides a snapshot of some recent research results in the field, providing readers with some useful tools and stimulating new ideas and applications for future investigation.
Choose an application
In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT). It includes seven chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more.
Choose an application
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of private applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
Cryptography --- History. --- Early modern history --- History of science --- Social history
Choose an application
Periodicals --- Isecure --- Information --- security --- cryptology --- Cryptography --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- isecure --- information
Choose an application
cryptanalysis --- secret-key cryptography --- cryptographic protocols --- secure smart system/device --- digital rights management --- quantum safe cryptography --- Data encryption (Computer science) --- Cryptography --- Cryptography. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Computer Science --- Engineering sciences. Technology
Choose an application
block cipher --- implementation --- symmetric cryptology --- stream cipher --- hash function --- cryptanalysis --- Cryptography --- Ciphers
Choose an application
This book explores both the state of the art and the latest developments in QKD. It describes the fundamental concepts and practical aspects of QKD from a viewpoint of information security and quantum channel efficiency improvement. The purpose of this book is to extend and update the knowledge of the readers in the dynamically changing field of QKD. The authors attempt to present in detail their results of scientific research, which is divided into two sections - Modern QKD Technologies and Quantum Channel Construction. It will be useful for researchers, engineers, graduates, and doctoral students working in quantum cryptography and information security-related areas.
Choose an application
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.
Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer security
Choose an application
Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.
Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer networking & communications
Listing 1 - 10 of 72 | << page >> |
Sort by
|