This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements.
List of Reviewers.
Table of Contents.
Detailed Table of Contents.
1: Cryptography in Networking and Cyber Space.
2: Network Security.
3: Cryptography–Based Authentication for Protecting Cyber Systems.
4: Cryptography in E–Mail and Web Services.
5: E–Mail, Web Service and Cryptography.
6: Cryptography in E–Mail and Web Services.
7: Applied Cryptography in E–Mail Services and Web Services.
8: Cryptography in Wireless Communication.
9: Applied Cryptography in Wireless Sensor Networks.
10: Applied Cryptography in Infrastructure–Free Wireless Networks.
11: Cryptography in Electronic Commerce.
12: Applied Cryptography in Electronic Commerce.
13: An Electronic Contract Signing Protocol Using Fingerprint Biometrics.
14: Cryptography in Emerging Areas.
15: Secure and Private Service Discovery in Pervasive Computing Environments.
16: Multimedia Information Security: Cryptography and Steganography.