Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
  Top » Catalog » Books » Computer Science and Robotics » My Account  |  Cart Contents  |  Checkout   
Quick Find
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Development of the Cerebellum: Clinical and Molecular Perspectives
Shopping Cart more
0 items
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
01.Robotics in Surgery: History, Current and Future Applications
02.From Problem Toward Solution: Wireless Sensor Networks Security
03.Introduction to Graph and Hypergraph Theory
04.Wiki Supporting Formal and Informal Learning
05.Intelligent Vehicle Systems: A 4D/RCS Approach
06.Artificial Intelligence in Energy and Renewable Energy Systems
07.Advances in Security Information Management: Perceptions and Outcomes
08.Computer Vision and Robotics
09.MOSFETs: Properties, Preparations and Performance
10.Expert Systems Research Trends
Notifications more
NotificationsNotify me of updates to Cryptography: Protocols, Design and Applications
Tell A Friend
Tell someone you know about this product.
Cryptography: Protocols, Design and Applications
Retail Price: $170.00
10% Online Discount
You Pay:

Editors: Kamol Lek and Naruemol Rajapakse
Book Description:
Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electrical commerce. In this book, the authors present current research in the study of the protocols, design and application of cryptography. Topics discussed include quantum cryptography protocols and quantum security; visual cryptography for halftone images; mathematical cryptography of the RSA cryptosystem; multi-layer QKD protocol using correlated photon of dark soliton array in a wavelength router and low-cost mutual authentication protocols. (Imprint: Nova)

Table of Contents:
Preface pp. i-ix

Quantum Cryptographic Protocols and Quantum Security
(Laszlo Gyongyosi, Sandor Imre, Department of Telecommunications, Budapest University of Technology and Economics, Budapest, Hungary)
pp. 1-90
Low-Cost Mutual Authentication Protocols
(Mu’awya Naser, Pedro Peris-Lopez, Mohammad Rafie, Rahmat Budiarto, School of Computer Sciences, Unvirisity Sinas Malaysia, Pinang, Malaysia, and others) pp. 91-112

A Highly Efficient Visual Cryptography for Halftone Images
(Kai-Hui Lee, Pei-Ling Chiu, Yie-Tarng Chen, Department of Computer Science and Information Engineering, Ming Chuan University, Taipei, Taiwan, R.O.C., and others) pp. 113-132

Multi Layer QKD Protocol using Correlated Photon of Dark Soliton Array in a Wavelength Router
(P. Youplao, S. Mitatha, P.P. Yupapin, King Mongkut’s Institute of Technology Ladkrabang, Bangkok, Thailand) pp. 133-144

Chaos-Based Cryptosystem in Different Modes of Block Encryption
(Rhouma Rhouma, Safya Belghith, Syscom Laboratory, Ecole Nationale d'Ingenieurs de Tunis, Tunisia) pp. 145-158

The Mathematical Cryptography of the RSA Cryptosystem
(Abderrahmane Nitaj, Laboratoire de Mathématiques Nicolas Oresme, Université de Caen, France) pp. 159-186

Quantum Secure Communication
(A. El Allati, Faculte des Sciences, Laboratoire de Physique Theorique URAC, Universite Mohammed V, Rabat, Morocco) pp. 187-212

Security Risk Measuring and Forecasting
(Stefan Rass, System Security Group, Universitat Klagenfurt, Austria)
pp. 213-236
Index pp. 237-242

      Cryptography, Steganography and Data Security
      Privacy and Identity Protection
   Binding: Hardcover
   Pub. Date: 2012- December
   Pages: 251, 7 x 10 (NBC - R)
   ISBN: 978-1-62100-779-1
   Status: AV
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
Special Focus Titles
01.Peter Singer’s Ethics: A Critical Appraisal
02.Sexism: Past, Present and Future Perspectives
03.Body and Politics: Elite Disability Sport in China
04.Childhood and Adolescence: Tribute to Emanuel Chigier, 1928-2017
05.Renal Replacement Therapy: Controversies and Future Trends
06.Food-Drug Interactions: Pharmacokinetics, Prevention and Potential Side Effects
07.Terrorism and Violence in Islamic History and Theological Responses to the Arguments of Terrorists
08.International Event Management: Bridging the Gap between Theory and Practice
09.The Sino-Indian Border War and the Foreign Policies of China and India (1950-1965)
10.Tsunamis: Detection, Risk Assessment and Crisis Management
11.Sediment Watch: Monitoring, Ecological Risk Assessment and Environmental Management
12.Self-Regulated Learners: Strategies, Performance, and Individual Differences

Nova Science Publishers
© Copyright 2004 - 2018

Cryptography: Protocols, Design and Applications