Indices2
Theory and Practice of Cryptography Solutions for Secure Information Systems

Theory and Practice of Cryptography Solutions for Secure Information Systems

Copyright: © 2013 |Pages: 351
ISBN13: 9781466640306|ISBN10: 1466640308|EISBN13: 9781466640313
DOI: 10.4018/978-1-4666-4030-6
Cite Book Cite Book

MLA

Elçi, Atilla, et al., editors. Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. https://doi.org/10.4018/978-1-4666-4030-6

APA

Elçi, A., Pieprzyk, J., Chefranov, A. G., Orgun, M. A., Wang, H., & Shankaran, R. (Eds.). (2013). Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global. https://doi.org/10.4018/978-1-4666-4030-6

Chicago

Elçi, Atilla, et al., eds. Theory and Practice of Cryptography Solutions for Secure Information Systems. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-4030-6

Export Reference

Mendeley
Favorite Full-Book Download

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns.

Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Cryptographic Methods Analysis
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Cryptographic Systems  (pages 109-109)
Cryptographic Systems
This content has been removed at the discretion of the publisher and the editors.
Cryptographic Solutions for Distributed Systems
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Cryptographic Trust Solutions
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Engineering Secure Information Systems
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.