Algorithmic strategies for solving complex problems in cryptography:
"This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptography. It addresses techniques for solving the problem and the performance results of the techn...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Disseminator of Knowledge
[2018]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-1049 DE-91 DE-706 DE-29 DE-20 DE-898 DE-83 URL des Erstveröffentlichers |
Zusammenfassung: | "This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptography. It addresses techniques for solving the problem and the performance results of the technique in terms of time taken and storage capacity used"-- |
Beschreibung: | 1 Online-Ressource (xix, 302 Seiten) |
ISBN: | 9781522529163 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044955185 | ||
003 | DE-604 | ||
005 | 20190716 | ||
007 | cr|uuu---uuuuu | ||
008 | 180522s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781522529163 |9 978-1-5225-2916-3 | ||
024 | 7 | |a 10.4018/978-1-5225-2915-6 |2 doi | |
035 | |a (ZDB-1-IGE)00179203 | ||
035 | |a (OCoLC)1037901547 | ||
035 | |a (DE-599)BVBBV044955185 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-706 |a DE-1049 |a DE-1050 |a DE-29 |a DE-20 |a DE-898 |a DE-83 | ||
082 | 0 | |a 005.8/24 |2 23 | |
245 | 1 | 0 | |a Algorithmic strategies for solving complex problems in cryptography |c Kannan Balasubramanian (Mepco Schlenk Engineering College, India), M. Rajakani (Mepco Schlenk Engineering College, India) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Disseminator of Knowledge |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (xix, 302 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
520 | |a "This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptography. It addresses techniques for solving the problem and the performance results of the technique in terms of time taken and storage capacity used"-- | ||
650 | 4 | |a Data encryption (Computer science) / Mathematics | |
650 | 4 | |a Computer algorithms | |
700 | 1 | |a Balasubramanian, Kannan |d 1968- |0 (DE-588)1168038669 |4 edt | |
700 | 1 | |a Rajakani, M. |d 1983- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-5225-2915-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-2915-2 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-29 |p ZDB-98-IGB |q UER_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079017202647040 |
---|---|
adam_text | |
any_adam_object | |
author2 | Balasubramanian, Kannan 1968- Rajakani, M. 1983- |
author2_role | edt edt |
author2_variant | k b kb m r mr |
author_GND | (DE-588)1168038669 |
author_facet | Balasubramanian, Kannan 1968- Rajakani, M. 1983- |
building | Verbundindex |
bvnumber | BV044955185 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)00179203 (OCoLC)1037901547 (DE-599)BVBBV044955185 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044955185</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190716</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180522s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522529163</subfield><subfield code="9">978-1-5225-2916-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-2915-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00179203</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1037901547</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044955185</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Algorithmic strategies for solving complex problems in cryptography</subfield><subfield code="c">Kannan Balasubramanian (Mepco Schlenk Engineering College, India), M. Rajakani (Mepco Schlenk Engineering College, India)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 302 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptography. It addresses techniques for solving the problem and the performance results of the technique in terms of time taken and storage capacity used"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science) / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer algorithms</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Balasubramanian, Kannan</subfield><subfield code="d">1968-</subfield><subfield code="0">(DE-588)1168038669</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rajakani, M.</subfield><subfield code="d">1983-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-5225-2915-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-2915-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">UER_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044955185 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:17Z |
institution | BVB |
isbn | 9781522529163 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030347872 |
oclc_num | 1037901547 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-706 DE-1049 DE-1050 DE-29 DE-20 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-706 DE-1049 DE-1050 DE-29 DE-20 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xix, 302 Seiten) |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB UER_Einzelkauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Algorithmic strategies for solving complex problems in cryptography Kannan Balasubramanian (Mepco Schlenk Engineering College, India), M. Rajakani (Mepco Schlenk Engineering College, India) Hershey PA, USA IGI Global, Disseminator of Knowledge [2018] © 2018 1 Online-Ressource (xix, 302 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Premier reference source "This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptography. It addresses techniques for solving the problem and the performance results of the technique in terms of time taken and storage capacity used"-- Data encryption (Computer science) / Mathematics Computer algorithms Balasubramanian, Kannan 1968- (DE-588)1168038669 edt Rajakani, M. 1983- edt Erscheint auch als Druck-Ausgabe, Hardcover 978-1-5225-2915-6 Erscheint auch als Druck-Ausgabe 1-5225-2915-2 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Algorithmic strategies for solving complex problems in cryptography Data encryption (Computer science) / Mathematics Computer algorithms |
title | Algorithmic strategies for solving complex problems in cryptography |
title_auth | Algorithmic strategies for solving complex problems in cryptography |
title_exact_search | Algorithmic strategies for solving complex problems in cryptography |
title_full | Algorithmic strategies for solving complex problems in cryptography Kannan Balasubramanian (Mepco Schlenk Engineering College, India), M. Rajakani (Mepco Schlenk Engineering College, India) |
title_fullStr | Algorithmic strategies for solving complex problems in cryptography Kannan Balasubramanian (Mepco Schlenk Engineering College, India), M. Rajakani (Mepco Schlenk Engineering College, India) |
title_full_unstemmed | Algorithmic strategies for solving complex problems in cryptography Kannan Balasubramanian (Mepco Schlenk Engineering College, India), M. Rajakani (Mepco Schlenk Engineering College, India) |
title_short | Algorithmic strategies for solving complex problems in cryptography |
title_sort | algorithmic strategies for solving complex problems in cryptography |
topic | Data encryption (Computer science) / Mathematics Computer algorithms |
topic_facet | Data encryption (Computer science) / Mathematics Computer algorithms |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2915-6 |
work_keys_str_mv | AT balasubramaniankannan algorithmicstrategiesforsolvingcomplexproblemsincryptography AT rajakanim algorithmicstrategiesforsolvingcomplexproblemsincryptography |