Nothing Special   »   [go: up one dir, main page]

Gohel, 2015 - Google Patents

Introduction to Network & Cybersecurity

Gohel, 2015

Document ID
16922340938953990585
Author
Gohel H
Publication year

External Links

Snippet

The network is no more trustworthy if it is not secure. So, this book is taking an integrated approach for network security as well as cybersecurity. It is also presenting diagrams and figures so any reader can easily understand complex algorithm design and its related issues …
Continue reading at books.google.com (other versions)

Similar Documents

Publication Publication Date Title
Hickman et al. The SSL protocol
Kessler An overview of cryptography
Harba Secure data encryption through a combination of AES, RSA and HMAC
Housley Cryptographic message syntax (CMS) algorithms
JP2017063432A (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
Banoth et al. Classical and Modern Cryptography for Beginners
Banoth et al. An Introduction to Classical and Modern Cryptography
Rajasekar et al. Introduction to classical cryptography
Kumar et al. A novel framework for secure file transmission using modified AES and MD5 algorithms
Gohel Introduction to Network & Cybersecurity
Benaloh et al. The private communication technology (pct) protocol
Banoth et al. Asymmetric Key Cryptography
Gupta Cryptography and Network Security
Tiwari et al. Cryptographic hash function: an elevated view
Mutabaruka Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman)
Rösler et al. Interoperability between messaging services secure–implementation of encryption
Rabah Secure implementation of message digest, authentication and digital signature
Boonkrong et al. Introduction to Cryptography
Roos Lecture Notes: Computer Networks CSE1405 Cryptography and Network Security
Niture Cryptographic Algorithm Analysis and Implementation
van Oorschot et al. Cryptographic Building Blocks
Bhatia Cryptography-The Hidden Message
Alsmadi et al. Information Assurance/Encryption
Venugopal The design, implementation, and evaluation of cryptographic distributed applications: Secure PVM
Grasso et al. Definition of terms used by the Auto-ID Labs in the anti-counterfeiting white paper series