000 | 03469nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-981-99-7081-0 | ||
003 | DE-He213 | ||
005 | 20240207153802.0 | ||
007 | cr nn 008mamaa | ||
008 | 231214s2023 si | s |||| 0|eng d | ||
020 |
_a9789819970810 _9978-981-99-7081-0 |
||
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTEC009000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
100 | 1 |
_aShandilya, Shishir Kumar. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 2 |
_aA Nature-Inspired Approach to Cryptology _h[electronic resource] / _cby Shishir Kumar Shandilya, Agni Datta, Atulya K. Nagar. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2023. |
|
300 |
_aXXIII, 309 p. 18 illus., 10 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Computational Intelligence, _x1860-9503 ; _v1122 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _aIntroduction to Nature Inspired Algorithms -- Cryptography Background and Primitives -- Genetic Cryptography -- Neural Cryptography -- DNA based Cryptography -- Optimization of Cryptosystems using Nature Inspired Algorithms -- Bio-inspired Lightweight Approaches to Cryptography -- Chaos Cryptography. | |
520 | _aThis book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 1 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aAlgorithms. |
700 | 1 |
_aDatta, Agni. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aNagar, Atulya K. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819970803 |
776 | 0 | 8 |
_iPrinted edition: _z9789819970827 |
776 | 0 | 8 |
_iPrinted edition: _z9789819970834 |
830 | 0 |
_aStudies in Computational Intelligence, _x1860-9503 ; _v1122 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-99-7081-0 |
912 | _aZDB-2-INR | ||
912 | _aZDB-2-SXIT | ||
942 | _cLIBRO_ELEC | ||
999 |
_c263504 _d263503 |