EUR 54,18
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 242.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2014 in the subject Computer Science - IT-Security, Lovely Professional University, Punjab, course: M.Tech (Computer Science and Engineering), language: English, abstract: Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user's personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user's identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this paper, a novel approach is implemented to protect user's confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for 'authorization' to enter the network, 2) Image Sequencing password for 'authentication' wherein it is proved that the identity is original user, and 3) RSA algorithm to encrypt the data further for providing 'data integrity'. Thus this approach provides an overall security to the client's personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 105,51
Anzahl: 1 verfügbar
In den WarenkorbZustand: Used. pp. 254.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: Used. pp. 254.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 129,90
Anzahl: 1 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: ML Books International - IPS, 2015
ISBN 10: 1632401134 ISBN 13: 9781632401137
Anbieter: moluna, Greven, Deutschland
EUR 90,41
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.Books on Demand GmbH, Überseering 33, 22297 Hamburg 258 pp. Englisch.
EUR 170,93
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: Springer Nature Singapore, Springer Nature Singapore, 2025
ISBN 10: 9819649471 ISBN 13: 9789819649471
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book examines the fundamentals of quantum computing and its applications in codebreaking and hacking, as well as strategies and technologies for defending systems against quantum attacks. It brings together leading experts from across academia and industry to provide a comprehensive overview of the impacts of quantum computing on cybersecurity and cryptography. As quantum computers become more powerful and practical in the coming years, they pose a serious threat to current encryption and cybersecurity methods which rely on computational difficulty. The book provides readers with a holistic understanding of the quantum computing landscape and its implications on information security.The chapters cover the foundational concepts of quantum mechanics and key quantum algorithms relevant to cryptography and cybersecurity. Detailed discussions on quantum cryptanalysis, post-quantum cryptography, quantum key distribution, and quantum random number generation equip readers with technical knowledge of quantum-safe cryptosystems. Practical topics such as quantum programming, software tools, and implementation of quantum-resistant solutions in different sectors like finance, healthcare, and the Internet of Things provide actionable insights for organizations. The book concludes with an analysis of collaborative strategies, policies and future research directions to foster innovation in quantum-safe cybersecurity. Overall, this book serves as an essential reference for security professionals, researchers, students, and technology leaders interested in preparing systems and data for the quantum computing era.