Books by Alexander Chefranov
This is a fast track publication opportunity. This book will be published by IGI Global by end 20... more This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
Uploads
Books by Alexander Chefranov
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.