FinUniversity Electronic Library

     

Details

Critical explorations.
Cryptography: breakthroughs in research and practice / Information Resources Management Association (editor). — 1 online resource (xv, 578 pages). — (Critical explorations). — <URL:http://elib.fa.ru/ebsco/2332377.pdf>.

Record create date: 8/5/2019

Subject: Cryptography.; Data transmission systems — Security measures.; Computers — Access control.; Computers — Access control.; Cryptography.; Data transmission systems — Security measures.

Collections: EBSCO

Allowed Actions:

Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network

Group: Anonymous

Network: Internet

Annotation

"This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"--.

Document access rights

Network User group Action
Finuniversity Local Network All Read Print Download
Internet Readers Read Print
-> Internet Anonymous

Table of Contents

  • Cover
  • Title Page
  • Copyright Page
  • List of Contributors
  • Table of Contents
  • Preface
  • Section 1: Chaotic and DNA-Based Cryptography
    • Chapter 1: Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption
    • Chapter 2: Chaotic Function Based ECG Encryption System
    • Chapter 3: Biometric Image Security Using Chaos Algorithm
    • Chapter 4: DNA Sequence Based Cryptographic Solution for Secure Image Transmission
    • Chapter 5: IPHDBCM
  • Section 2: Cryptographic Algorithms
    • Chapter 6: Cryptographic Techniques Based on Bio-Inspired Systems
    • Chapter 7: Modification of Traditional RSA into Symmetric-RSA Cryptosystems
    • Chapter 8: Hybrid Approach of Modified AES
    • Chapter 9: Cryptographic Algorithms for Next Generation Wireless Networks Security
    • Chapter 10: Efficient Energy Saving Cryptographic Techniques with Software Solution in Wireless Network
    • Chapter 11: Applicability of Cellular Automata in Cryptanalysis
  • Section 3: Encryption Keys and Homomorphic Encryption
    • Chapter 12: A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPU
    • Chapter 13: Provable Security for Public Key Cryptosystems
    • Chapter 14: Towards Parameterized Shared Key for AVK Approach
    • Chapter 15: Authentication of Smart Grid
    • Chapter 16: Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group
    • Chapter 17: A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
    • Chapter 18: A Secure Cloud Storage using ECC-Based Homomorphic Encryption
    • Chapter 19: Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment
  • Section 4: Steganography
    • Chapter 20: Digital Image Steganography
    • Chapter 21: Improved Secure Data Transfer Using Video Steganographic Technique
    • Chapter 22: Secure Group Message Transfer Stegosystem
    • Chapter 23: Implementation and Evaluation of Steganography Based Online Voting System
  • Section 5: Visual Cryptography
    • Chapter 24: Exploiting the Homomorphic Property of Visual Cryptography
    • Chapter 25: Basic Visual Cryptography Using Braille
    • Chapter 26: Threshold Secret Sharing Scheme for Compartmented Access Structures
    • Chapter 27: An Improved Size Invariant (n, n) Extended Visual Cryptography Scheme
    • Chapter 28: A Methodological Evaluation of Crypto-Watermarking System for Medical Images
    • Chapter 29: Reversible Watermarking in Medical Image Using RDWT and Sub-Sample
    • Chapter 30: Video Saliency Detection for Visual Cryptography-Based Watermarking
    • Chapter 31: On the Pixel Expansion of Visual Cryptography Scheme
    • Chapter 32: A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix VSS
    • Chapter 33: A Contemplator on Topical Image Encryption Measures
  • Index

Usage statistics

stat Access count: 0
Last 30 days: 0
Detailed usage statistics