Cryptography and security services mechanisms and applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptog...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Cybertech Pub.
2007
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Classic cryptography
- Information assurance
- Number theory and finite fields
- Confidentiality : symmetric encryption
- Confidentiality : asymmetric encryption
- Integrity and authentication
- Access authentication
- Elliptic curve cryptography
- Certificates and public key infrastructure
- Electronic mail security
- VPNS and IPSEC
- TLS, SSL, and SET
- Web services security
- Wireless security.


