LEADER 03340nam 2200829z- 450 001 9910566470303321 005 20231214132943.0 035 $a(CKB)5680000000037677 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/81008 035 $a(EXLCZ)995680000000037677 100 $a20202205d2022 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptography and Its Applications in Information Security 210 $aBasel$cMDPI - Multidisciplinary Digital Publishing Institute$d2022 215 $a1 electronic resource (202 p.) 311 $a3-0365-3767-8 311 $a3-0365-3768-6 330 $aNowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue ?Cryptography and Its Applications in Information Security? addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information. 606 $aTechnology: general issues$2bicssc 606 $aHistory of engineering & technology$2bicssc 610 $abit independence criterion 610 $abit independence 610 $aRC4 610 $astream cipher 610 $acomplexity 610 $achaos-based stream cipher 610 $aSPCNG 610 $a3D chebyshev 610 $alogistic 610 $askew-tent 610 $aFPGA 610 $aperformance 610 $amuseum 610 $adigital copyright management 610 $ablockchain 610 $asmart contract 610 $aauthorization model 610 $acoupled map lattice 610 $aintermittent jumping 610 $amulti-chaos 610 $apublic key exchange 610 $asecurity 610 $aasymmetric 610 $aasymmetric algorithm 610 $acryptography 610 $aframework 610 $alimited computational power 610 $acomputationally biased 610 $aintrusion detection systems 610 $amachine learning 610 $acommunication 610 $adigital cash 610 $aprivacy 610 $aprivacy preserving 610 $ahomomorphic encryption 610 $afederated learning 615 7$aTechnology: general issues 615 7$aHistory of engineering & technology 700 $aAssad$b Safwan El$4edt$01295523 702 $aLozi$b Rene?$4edt 702 $aPuech$b William$4edt 702 $aAssad$b Safwan El$4oth 702 $aLozi$b Rene?$4oth 702 $aPuech$b William$4oth 906 $aBOOK 912 $a9910566470303321 996 $aCryptography and Its Applications in Information Security$93023574 997 $aUNINA