Symmetric-key cryptography.- Public-key cryptography.- Algorithmic cryptanalysis.- Software and hardware implementation of cryptographic algorithms.- Database encryption.- Interaction between cryptographic theory and implementation issues.- Cyber security and dependability.- Network security and privacy.- Multimedia technology for homeland defense.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.