Symmetric-key cryptography.- Public-key cryptography.- Algorithmic cryptanalysis.- Software and hardware implementation of cryptographic algorithms.- Database encryption.- Interaction between cryptographic theory and implementation issues.- Cyber security and dependability.- Network security and privacy.- Multimedia technology for homeland defense.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want