Cryptography and Security in Computing

Cryptography and Security in Computing

The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.

Publication date: 07 Mar 2012

ISBN-10: n/a

ISBN-13: 9789535101796

Paperback: 256 pages

Views: 2,606

Type: N/A

Publisher: InTech

License: Creative Commons Attribution 3.0 Unported

Post time: 12 Nov 2016 12:00:00

Cryptography and Security in Computing

Cryptography and Security in Computing The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Tag(s): Computer Security Cryptography
Publication date: 07 Mar 2012
ISBN-10: n/a
ISBN-13: 9789535101796
Paperback: 256 pages
Views: 2,606
Document Type: N/A
Publisher: InTech
License: Creative Commons Attribution 3.0 Unported
Post time: 12 Nov 2016 12:00:00
Summary/Excerpts of (and not a substitute for) the Creative Commons Attribution 3.0 Unported:
You are free to:

Share — copy and redistribute the material in any medium or format
Adapt — remix, transform, and build upon the material for any purpose, even commercially.

The licensor cannot revoke these freedoms as long as you follow the license terms.

Click here to read the full license.
From the Book Description:
Jaydip Sen wrote:The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.




About The Editor(s)


Jaydip Sen is a Professor in Calcutta Business School, Kolkata, India, working in the Analytics and Information Technology department. He has worked in reputed organizations like Oil and Natural Gas Corporation Ltd., India, Oracle India Pvt. Ltd., and Akamai Technology Pvt. Ltd, Tata Consultancy Services Ltd and National Institute of Science and Technology, India. Prior to joining Calcutta Business School, he was a lead scientist in the Innovation Lab of Tata Consultancy Services, Kolkata, India, where he was involved in research and development in security and privacy aspects in wireless networks and Internet of Things.

Jaydip Sen

Jaydip Sen is a Professor in Calcutta Business School, Kolkata, India, working in the Analytics and Information Technology department. He has worked in reputed organizations like Oil and Natural Gas Corporation Ltd., India, Oracle India Pvt. Ltd., and Akamai Technology Pvt. Ltd, Tata Consultancy Services Ltd and National Institute of Science and Technology, India. Prior to joining Calcutta Business School, he was a lead scientist in the Innovation Lab of Tata Consultancy Services, Kolkata, India, where he was involved in research and development in security and privacy aspects in wireless networks and Internet of Things.


Book Categories
Sponsors
Icons8, a free icon pack