TY - CHAP AU - Hilal M. Yousif Al-Bayatti AU - Abdul Monem S. Rahma AU - Hala Bhjat Abdul Wahab ED - Jaydip Sen Y1 - 2012-03-07 PY - 2012 T1 - PGP Protocol and Its Applications N2 - The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. BT - Cryptography and Security in Computing SP - Ch. 9 UR - https://doi.org/10.5772/36971 DO - 10.5772/36971 SN - PB - IntechOpen CY - Rijeka Y2 - 2024-04-16 ER -