Gohel, 2015 - Google Patents
Introduction to Network & CybersecurityGohel, 2015
- Document ID
- 16922340938953990585
- Author
- Gohel H
- Publication year
External Links
Snippet
The network is no more trustworthy if it is not secure. So, this book is taking an integrated approach for network security as well as cybersecurity. It is also presenting diagrams and figures so any reader can easily understand complex algorithm design and its related issues …
- 238000011160 research 0 abstract description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hickman et al. | The SSL protocol | |
Kessler | An overview of cryptography | |
Harba | Secure data encryption through a combination of AES, RSA and HMAC | |
Housley | Cryptographic message syntax (CMS) algorithms | |
JP2017063432A (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
Banoth et al. | Classical and Modern Cryptography for Beginners | |
Banoth et al. | An Introduction to Classical and Modern Cryptography | |
Rajasekar et al. | Introduction to classical cryptography | |
Kumar et al. | A novel framework for secure file transmission using modified AES and MD5 algorithms | |
Gohel | Introduction to Network & Cybersecurity | |
Benaloh et al. | The private communication technology (pct) protocol | |
Banoth et al. | Asymmetric Key Cryptography | |
Gupta | Cryptography and Network Security | |
Tiwari et al. | Cryptographic hash function: an elevated view | |
Mutabaruka | Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman) | |
Rösler et al. | Interoperability between messaging services secure–implementation of encryption | |
Rabah | Secure implementation of message digest, authentication and digital signature | |
Boonkrong et al. | Introduction to Cryptography | |
Roos | Lecture Notes: Computer Networks CSE1405 Cryptography and Network Security | |
Niture | Cryptographic Algorithm Analysis and Implementation | |
van Oorschot et al. | Cryptographic Building Blocks | |
Bhatia | Cryptography-The Hidden Message | |
Alsmadi et al. | Information Assurance/Encryption | |
Venugopal | The design, implementation, and evaluation of cryptographic distributed applications: Secure PVM | |
Grasso et al. | Definition of terms used by the Auto-ID Labs in the anti-counterfeiting white paper series |