Basic Methods Of Cryptography By Jan C A
This text covers the fundamentals of cryptography, the means of establishiing security in the storage and transportation of information. With the proliferation of computer use in business, information is being communicated and processed automatically on a large scale. Medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks all process highly sensitive information. There is a growing need for the protection of information to safeguard economic interests, to prevent fraud, and to ensure privacy. In this book, the author describes the fundamentals of secure storage and transportation of information. Van der Lubbe pays particular attention to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, to methods for authentication, data integrity and digital signatures, key management, and to network aspects. The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers.
Jan C. A. Van Der Lubbe
Delft Academic Press / VSSD Basic Methods of Cryptography Jan C.A. VAN DER LUBBE Associate Professor Information Theory. This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transportation of information. Computers are now.
'synopsis' may belong to another edition of this title. Book Description: This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transportation of information.
Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. The book will be of value to advanced students and researchers involved in data protection and information processing, especially electrical engineers and people working in informatics and computer science. Language Notes: Text: English (translation) Original Language: Dutch 'About this title' may belong to another edition of this title. Book Description CAMBRIDGE UNIVERSITY PRESS, United Kingdom, 1998. Condition: New.
Language: English. Brand New Book. Janiya facebook. This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transmission of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks.
In all these cases there is a growing need for the protection of information to safeguard economic interests, to prevent fraud and to ensure privacy. In this book, the fundamentals of secure storage and transportation of information are described. Among other things, attention is given to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, which are suitable for data security, to methods for authentication, data integrity and digital signatures, key management and to network aspects. The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers.
Seller Inventory # CBL593. Book Description CAMBRIDGE UNIVERSITY PRESS, United Kingdom, 1998. Condition: New. Language: English. Brand New Book. This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transmission of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale.
Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. In all these cases there is a growing need for the protection of information to safeguard economic interests, to prevent fraud and to ensure privacy. In this book, the fundamentals of secure storage and transportation of information are described. Among other things, attention is given to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, which are suitable for data security, to methods for authentication, data integrity and digital signatures, key management and to network aspects. The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers. Seller Inventory # CBL593.
This text covers the fundamentals of cryptography, the means of establishiing security in the storage and transportation of information. With the proliferation of computer use in business, information is being communicated and processed automatically on a large scale. Medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and globa This text covers the fundamentals of cryptography, the means of establishiing security in the storage and transportation of information. With the proliferation of computer use in business, information is being communicated and processed automatically on a large scale.
Medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks all process highly sensitive information. There is a growing need for the protection of information to safeguard economic interests, to prevent fraud, and to ensure privacy. In this book, the author describes the fundamentals of secure storage and transportation of information. Van der Lubbe pays particular attention to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, to methods for authentication, data integrity and digital signatures, key management, and to network aspects.
The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers.