Theory and Practice of Cryptography Solutions for Secure Information Systems
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Reference > Research and information: general > Information theory > Theory and Practice of Cryptography Solutions for Secure Information Systems: (Advances in Information Security, Privacy, and Ethics)
Theory and Practice of Cryptography Solutions for Secure Information Systems: (Advances in Information Security, Privacy, and Ethics)

Theory and Practice of Cryptography Solutions for Secure Information Systems: (Advances in Information Security, Privacy, and Ethics)


     0     
5
4
3
2
1



International Edition


X
About the Book

Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

About the Author :
Atilla Elçi is full professor and chairman of the Department of Electrical and Electronics Engineering at Aksaray University, Aksaray, Turkey, since August 2012. He was full professor and chairman of computer and educational technology at Süleyman Demirel University, Isparta, Turkey (May 2010 - June 2012). He served as full professor of computer engineering, the founding director of the Graduate School of Science and Technology, and the dean of Engineering Faculty at Toros University, Mersin, Turkey (July 2010 - June 2011); with the Computer Engineering Program, Middle East Technical University (METU NCC, Spring 2010); Eastern Mediterranean University (2003-2009) where he established the Internet Technologies Research Center and semantic robotics lab; Haliç University, Istanbul, Turkey, founder and chair of the Computer Engineering Department (2000-2003); the International Telecommunication Union, Geneva, Switzerland, as chief technical advisor (1985-1997); METU Ankara, Turkey, where he was chair and assistant chair of Computer Engineering Department(1976-1985); Purdue University, W. Lafayette, Indiana, USA, as research assistant (1974-5). He has organised or served in the committees of numerous international conferences. He has been organising IEEE Engineering Semantic Agent Systems Workshops since 2006, Security of Information and Networks Conferences since 2007; and, IJRCS Symposiums 2007&9. He has published over a hundred journal and conference papers; edited the book titled Semantic Agent Systems (Springer 2011), Theory and Practice of Cryptography Solutions for Secure Information Systems (IGI 2013); proceedings of SIN 2007, 9 – 12 by ACM, ESAS 2006-12 by IEEE CS, and IJRCS 2009; special issues. He was the programme chair for the 36th COMPSAC (2012). He obtained B.Sc. in Computer/Control Engineering at METU, Ankara, Turkey (1970), M.Sc. & Ph.D. in Computer Sciences at Purdue University, USA (1973, 1975). His research and experience encompass web semantics, agent-based systems, robotics, machine learning, knowledge representation and ontology, information security, software engineering, and natural language translation. Josef Pieprzyk is a Professor, Chair of Computing, at Macquarie University. His main research interest focus is Cryptology and Computer Security and includes design and analysis of cryptographic algorithms (such as encryption, hashing and digital signatures), secure multiparty computations, cryptographic protocols, copyright protection, e-commerce, web security and cybercrime prevention. Professor Pieprzyk is a member of the editorial boards for International Journal of Information Security, Journal of Mathematical Cryptology, International Journal of Applied Cryptography, Fundamenta Informaticae, Journal of Research and Practice in Information Technology, International Journal of Security and Networks and International Journal of Information and Computer Security. Professor Pieprzyk was instrumental in creation of both Auscrypt and ACISP conference streams. The Auscrypt stream was re-named as Asiacrypt and later included by IACR as one of the flagship conferences along with Eurocrypt and Crypto. The ACISP conference is the main cryptographic event in Australia and New Zealand. In 2008 he was the Programme Chair of Asiacrypt 2008 (Melbourne, Australia). In 2010 he was serving the Programme Chair of CT-RSA 2010 (San Francisco, USA). He is serving on many programme committees of international conferences. Professor Pieprzyk published 5 books, edited 10 books (conference proceedings published by Springer-Verlag), 6 book chapters, and ~200 papers in refereed journals and refereed international conferences. Alexander G. Chefranov holds the degrees of a Ph.D. (Computer Science) and a Doctor of Engineering Sciences. He is currently an Associate Professor of the Department of Computer Engineering, Eastern Mediterranean University, Famagusta, North Cyprus. There he was one of the founders of Internet Technologies Research Center and served as its Director in 2008/09. Prior to joining Eastern Mediterranean University, he was a professor at the Department of Software Engineering at Taganrog State University of Radio-Engineering in Russia. His research interests in information security include symmetric and asymmetric ciphers, authentication and key exchange protocols, database security. He served as a programme committee chair of SIN 2009 held in North Cyprus in 2009 and a programme committee co-chair of SIN Conferences held in Russia, Australia, and India in 2010-12. Mehmet A. Orgun is a professor at Macquarie University, Sydney, Australia. He received his B.Sc. and M.Sc. degrees in computer science and engineering from Hacettepe University, Ankara, Turkey in 1982 & 1985 respectively; and his PhD degree in computer science from the University of Victoria, Canada in 1991. Prior to joining Macquarie University in September 1992, he worked as a post-doctoral fellow at the University of Victoria. He was elevated to the grade of a Senior Member of IEEE (SMIEEE) in 1996. He researches in the broad area of intelligent systems, with specific research interests in knowledge discovery, trusted systems, multi-agent systems, and industry applications of these research areas. He was the Programme Committee co-chair of The 20th Australian Joint Conference on Artificial Intelligence (AI'07) and the Conference co-chair of the 2nd International Conference on Security of Information and Networks (SIN 2009). He has been serving as Programme Committee Co-Chair of the 14th Pacific-Rim International Conference on Artificial Intelligence (PRICAI'2010), and The Conference Co-Chair of the 3rd International Conference on Security of Information and Networks (SIN 2010). He serves on the editorial boards of The Journal of Universal Computer Science, and Expert Systems: The Journal of Knowledge Engineering. Huaxiong Wang received a PhD in Mathematics from University of Haifa, Israel in 1996 and a PhD in Computer Science from University of Wollongong, Australia in 2001. He Joined Nanyang Technological University, Singapore in 2006 and is currently an associate professor in the Division of Mathematical Sciences. Prior to that, he held positions in several universities, including Macquarie University, Australia; City University of Hong Kong; University of Wollongong, Australia, National University of Singapore, Kobe University, Japan. His research interests include cryptography, information security, coding theory, combinatorics and theoretical computer science. He has been on the editorial boards of Designs, Codes and Cryptography, International Journal of Foundations of Computer Science, Journal of Communications (JCM) and Journal of Communications and Networks. He was the Programme Co-Chair of 9th Australasian Conference on Information Security and Privacy (ACISP'04), Sydney, Australia, 2004 and 4th International Conference on Cryptology and Network Security (CANS05), Xiamen, China, 2005. He received the inaugural Award of Best Research Contribution awarded by the Computer Science Association of Australasia in 2004. Rajan Shankaran is a senior lecturer at Macquarie University, Sydney, Australia. He received the MBA (MIS) degree in Information Systems Maastricht School of Management in 1994; and MSc (Honours) and PhD degrees in Computing from the University of Western Sydney in 1999 and 2005 respectively. He joined Macquarie University as a lecturer in 2001 and was promoted to senior lecturer in 2011. Prior to Macquarie University, he was employed, first as an associate lecturer and then as a lecturer, at the University of Western Sydney. He mainly works in the areas of network security and trust in mobile networks. He has served as a programme committee member for a number of conferences in computer networking and security. More recently, he has been serving as the Programme Co-Chair as well as local arrangements chair; of the 4th International Conference on Security of Information and Networks (SIN 2011) held in Sydney in November 2011.


Best Sellers


Product Details
  • ISBN-13: 9781466640306
  • Publisher: Idea Group,U.S.
  • Publisher Imprint: Idea Group,U.S.
  • Language: English
  • Returnable: N
  • Weight: 1740 gr
  • ISBN-10: 1466640308
  • Publisher Date: 31 May 2013
  • Binding: Hardback
  • No of Pages: 351
  • Series Title: Advances in Information Security, Privacy, and Ethics


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Theory and Practice of Cryptography Solutions for Secure Information Systems: (Advances in Information Security, Privacy, and Ethics)
Idea Group,U.S. -
Theory and Practice of Cryptography Solutions for Secure Information Systems: (Advances in Information Security, Privacy, and Ethics)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Theory and Practice of Cryptography Solutions for Secure Information Systems: (Advances in Information Security, Privacy, and Ethics)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!