LEADER 01144nam0 22002891i 450 001 UON00268588 005 20231205103746.565 010 $a28-940604-6-7 100 $a20051102d1990 |0itac50 ba 101 $afre 102 $aCA 105 $a|||| ||||| 200 1 $aPélagie-la-Charrette$fAntonine Maillet$gintroduction de Pierre Filion 205 $aNouvelle édition 210 $aMontréal$cBibliotèque québécoise$d1990 215 $a334 p.$d18 cm. 410 1$1001UON00173098$12001 $a Collection Littérature$1210 $aQuébec$cBibliothèque québécoise. 620 $aCA$dMontréal$3UONL000242 676 $aC843$cNarrativa francese del Canada$v21 700 1$aMAILLET$bAntonine$3UONV120987$0680486 712 $aBibliothèque Québécoise$3UONV266495$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00268588 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI Franc C 840 0103 $eSI LO 53714 5 0103 $sBuono 996 $aPélagie-la-Charrette$91239826 997 $aUNIOR LEADER 03373nam 2200853z- 450 001 9910566470303321 005 20220506 035 $a(CKB)5680000000037677 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/81008 035 $a(oapen)doab81008 035 $a(EXLCZ)995680000000037677 100 $a20202205d2022 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCryptography and Its Applications in Information Security 210 $aBasel$cMDPI - Multidisciplinary Digital Publishing Institute$d2022 215 $a1 online resource (202 p.) 311 08$a3-0365-3767-8 311 08$a3-0365-3768-6 330 $aNowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue "Cryptography and Its Applications in Information Security" addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information. 606 $aHistory of engineering & technology$2bicssc 606 $aTechnology: general issues$2bicssc 610 $a3D chebyshev 610 $aasymmetric 610 $aasymmetric algorithm 610 $aauthorization model 610 $abit independence 610 $abit independence criterion 610 $ablockchain 610 $achaos-based stream cipher 610 $acommunication 610 $acomplexity 610 $acomputationally biased 610 $acoupled map lattice 610 $acryptography 610 $adigital cash 610 $adigital copyright management 610 $afederated learning 610 $aFPGA 610 $aframework 610 $ahomomorphic encryption 610 $aintermittent jumping 610 $aintrusion detection systems 610 $alimited computational power 610 $alogistic 610 $amachine learning 610 $amulti-chaos 610 $amuseum 610 $an/a 610 $aperformance 610 $aprivacy 610 $aprivacy preserving 610 $apublic key exchange 610 $aRC4 610 $asecurity 610 $askew-tent 610 $asmart contract 610 $aSPCNG 610 $astream cipher 615 7$aHistory of engineering & technology 615 7$aTechnology: general issues 700 $aAssad$b Safwan El$4edt$01295523 702 $aLozi$b Rene?$4edt 702 $aPuech$b William$4edt 702 $aAssad$b Safwan El$4oth 702 $aLozi$b Rene?$4oth 702 $aPuech$b William$4oth 906 $aBOOK 912 $a9910566470303321 996 $aCryptography and Its Applications in Information Security$93023574 997 $aUNINA