Listing 1 - 10 of 25 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.
Computer security --- Cryptography --- Telecommunication systems --- Sécurité informatique --- Cryptographie --- Security measures --- Computer security. --- Cryptography. --- Security measures. --- Engineering & Applied Sciences --- Computer Science --- Telecommunication systems - Security measures.
Choose an application
Computer networks --- Computer security --- Security measures --- Government policy
Choose an application
Nuclear power plants --- Inspection --- Safety measures. --- Human factors --- Security measures
Choose an application
Computer security --- Administrative agencies --- Contracting out --- Data processing --- Security measures
Choose an application
Computer security --- Local area networks (Computer networks) --- Security measures
Choose an application
Shoplifting --- Retail trade --- Criminal statistics --- Victims of crimes --- Victims of crimes surveys --- Statistics. --- Security measures.
Listing 1 - 10 of 25 | << page >> |
Sort by
|