This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements.
Front Cover.
Title Page.
Copyright Page.
Dedication.
List of Reviewers.
Table of Contents.
Detailed Table of Contents.
Preface.
1: Cryptography in Networking and Cyber Space.
2: Network Security.
3: Cryptography–Based Authentication for Protecting Cyber Systems.
4: Cryptography in E–Mail and Web Services.
5: E–Mail, Web Service and Cryptography.
6: Cryptography in E–Mail and Web Services.
7: Applied Cryptography in E–Mail Services and Web Services.
8: Cryptography in Wireless Communication.
9: Applied Cryptography in Wireless Sensor Networks.
10: Applied Cryptography in Infrastructure–Free Wireless Networks.
11: Cryptography in Electronic Commerce.
12: Applied Cryptography in Electronic Commerce.
13: An Electronic Contract Signing Protocol Using Fingerprint Biometrics.
14: Cryptography in Emerging Areas.
15: Secure and Private Service Discovery in Pervasive Computing Environments.
16: Multimedia Information Security: Cryptography and Steganography.