Aspects of Network and Information SecurityEvangelos Kranakis, Evgueni Haroutunian, Evgueni A. Haroutunian, Elisa Shahbazian IOS Press, 2008 - 355 pages Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. This volume discusses topics such as network security, information security and coding. |
Autres éditions - Tout afficher
Expressions et termes fréquents
2008 IOS Press adversary Agaian algorithm Alice analysis applications approach authentication BGP speaker binary bits Bluetooth Cayley graph channel ciphertext classical color communication considered control flow graph corresponding cover-free code cryptographic protocols data hiding defined denote density matrix detection distortion distribution eavesdropper embedding encoding encryption entropy example fingerprint function guessing Haroutunian host IEEE IEEE Trans information hiding infrastructure Internet IP address kernel Kranakis Lemma linear codes malicious matrix measure mechanisms method modules multimedia nodes operations parameters perfect codes pixel plaintext prefix problem protocol psBGP public key q-ary quantum channel quantum cryptography quantum information quantum system quasicrystal quaternary linear qubit reconstruction reliability robust rootkits route S-BGP sequence server Shahbazian Eds signed permutations simulation soBGP Steganalysis steganography stego techniques Theorem tion traffic transmission vector watermarking wiretapper