Synopsis: |
? This reference provides an overview of applied cryptography protocols and algorithms in a precise and easy-to-follow treatment ? Covering a good breadth of cryptography algorithms, protocols, and applications, the book shares necessary details and the most up-to-date coverage of this important topic ? Includes applications of cryptography, including information authentication, public-key infrastructure, file encryption, broadcast encryption, e-voting, digital rights management, network security (IPSEC, VPNs, TLS, SSH), XML signatures, and mobile & wireless security |