Open access peer-reviewed Edited volume

Cryptography and Security in Computing

Edited by Jaydip Sen

Praxis Business School, Kolkata, INDIA

The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.

Read more >Order hardcopy
IntechOpen
Cryptography and Security in ComputingEdited by Jaydip Sen

Published: March 7th 2012

DOI: 10.5772/2213

ISBN: 978-953-51-0179-6

Books open for chapter submissions

31046 Total Chapter Downloads

1 Crossref Citations

4 Web of Science Citations

3 Dimensions Citations

chaptersDownloads

Open access peer-reviewed

1. Provably Secure Cryptographic Constructions

By Sergey I. Nikolenko

2269

Open access peer-reviewed

2. Malicious Cryptology and Mathematics

By Eric Filiol

2737

Open access peer-reviewed

3. Cryptographic Criteria on Vector Boolean Functions

By José Antonio Álvarez-Cubero and Pedro J. Zufiria

2646

Open access peer-reviewed

4. Construction of Orthogonal Arrays of Index Unity Using Logarithm Tables for Galois Fields

By Jose Torres-Jimenez, Himer Avila-George, Nelson Rangel-Valdez and Loreto Gonzalez-Hernandez

2758

Open access peer-reviewed

5. Elliptic Curve Cryptography and Point Counting Algorithms

By Hailiza Kamarulhaili and Liew Khang Jie

4061

Open access peer-reviewed

6. Division and Inversion Over Finite Fields

By Abdulah Abdulah Zadeh

3405

Open access peer-reviewed

7. Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

By Jaydip Sen

2124

Open access peer-reviewed

8. Scan-Based Side-Channel Attack on the RSA Cryptosystem

By Ryuta Nara, Masao Yanagisawa and Nozomu Togawa

2249

Open access peer-reviewed

9. PGP Protocol and Its Applications

By Hilal M. Yousif Al-Bayatti, Abdul Monem S. Rahma and Hala Bhjat Abdul Wahab

3305

Open access peer-reviewed

10. Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks

By Saman Shojae Chaeikar, Azizah Bt Abdul Manaf and Mazdak Zamani

1549

Open access peer-reviewed

11. Potential Applications of IPsec in Next Generation Networks

By Cristina-Elena Vintilă

3943

Edited volume and chapters are indexed in

  • Worldcat
  • OpenAIRE
  • Google Scholar
  • AZ ebsco
  • Base
  • CNKI
  • IET Inspec

Order a hardcopy of the Edited volume

Free shipping with DHL Express

Hardcover (ex. VAT)£140

Order now

Residents of European Union countries need to add a Book Value-Added Tax of 5%. Institutions and companies, registered as VAT taxable entities in their own EU member state, will not pay VAT by providing IntechOpen with their VAT registration number. This is made possible by the EU reverse charge method.

Special discount for IntechOpen contributors

All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard

Login and purchase