23,99 €
inkl. MwSt.

Versandfertig in 6-10 Tagen
  • Broschiertes Buch

This book covered an efficient method of cyber security to provide Data protection against cyber criminals. It provides data privacy, network security, integrity and identity management to access the data authorized users. Many public and private key procedures are recommended for securing data, however there are still a lot of challenge exist in this substance. Most familiar encryption techniques such as RSA, DES and AES are functioning against the cyber-crime. The proposed method of security mechanism provides three stages such as key generation, encryption and decryption. Also it provides…mehr

Produktbeschreibung
This book covered an efficient method of cyber security to provide Data protection against cyber criminals. It provides data privacy, network security, integrity and identity management to access the data authorized users. Many public and private key procedures are recommended for securing data, however there are still a lot of challenge exist in this substance. Most familiar encryption techniques such as RSA, DES and AES are functioning against the cyber-crime. The proposed method of security mechanism provides three stages such as key generation, encryption and decryption. Also it provides data confidentiality, data authentication and data access control. This scheme encrypts and decrypts the data fast and secure.
Autorenporträt
Sra. Punam R. Patil, professora assistente no Instituto de Tecnologia R.C. Patel, Shirpur. Ela é membro vitalício da Associação Internacional de Engenheiros (IAENG), Hong Kong. Publicou vários artigos relacionados com Rede Informática e Comunicação em conferências nacionais e internacionais.