In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr. Vineet Kumar Singh awarded PhD in Computer Science Engineering from Mahrshi University of Information Technology, Lucknow, Mtech from AIET Gautam Budh Technical University, Lucknow, Btech from Institute of Engineering & Technology Dr Rammanohar Lohia Avadh University Ayodhya(Faizabad).He is currently working as Assistant Professor.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated. 80 pp. Englisch. Bestandsnummer des Verkäufers 9786138967415
Anzahl: 2 verfügbar
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. Bestandsnummer des Verkäufers 26394695075
Anzahl: 4 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Print on Demand. Bestandsnummer des Verkäufers 401682044
Anzahl: 4 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND. Bestandsnummer des Verkäufers 18394695081
Anzahl: 4 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Singh Dr. Vineet KumarDr. Vineet Kumar Singh awarded PhD in Computer Science Engineering from Mahrshi University of Information Technology, Lucknow, Mtech from AIET Gautam Budh Technical University, Lucknow, Btech from Institute of. Bestandsnummer des Verkäufers 559295035
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - Print on Demand Titel. Neuware -In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 80 pp. Englisch. Bestandsnummer des Verkäufers 9786138967415
Anzahl: 1 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated. Bestandsnummer des Verkäufers 9786138967415
Anzahl: 1 verfügbar
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Evaluating Role of DNA and Kamla Approach in Metamorphic Cryptography | Vineet Kumar Singh (u. a.) | Taschenbuch | Englisch | 2021 | Scholars' Press | EAN 9786138967415 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. Bestandsnummer des Verkäufers 121148244
Anzahl: 5 verfügbar