- Hardcover: 365 pages
- Publisher: Auerbach Publications; 1 edition (November 17, 2014)
- Language: English
- ISBN-10: 1482228890
- ISBN-13: 978-1482228892
- Product Dimensions: 1 x 5 x 8 inches
- Shipping Weight: 1.6 pounds (View shipping rates and policies)
- Average Customer Review: 1 customer review
- Amazon Best Sellers Rank: #2,248,878 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Practical Cryptography: Algorithms and Implementations Using C++ 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Top 20 lists in Books
View the top 20 best sellers of all time, the most reviewed books of all time and some of our editors' favorite picks. Learn more
Customers who viewed this item also viewed
About the Author
Saiful Azad received his PhD in information engineering at University of Padova, Italy in 2013. He completed his B.Sc. from IUT, Bangladesh in computer and information technology, and M.Sc. from IIUM, Malaysia in computer and information engineering. After completion of his PhD, he joined as a faculty member in the Department of Computer Science at American International University – Bangladesh (AIUB). He started working on Underwater Acoustic Networks during his PhD and still it remains his main focus of research. His research interests also lie in designing and implementing communication protocols for any network architecture, QoS issues, network security, and simulator design. He is one of the developers of the DESERT underwater simulator. He is also the author of more than 30 scientific papers published in international peer-reviewed journals or conferences. He has served as a technical program committee member in numerous international conferences/workshops. He also serves as a reviewer of a couple of renowned peer-reviewed journals and conferences.
Al-Sakib Khan Pathan earned his PhD (MS leading to PhD) in computer engineering in 2009 from Kyung Hee University in South Korea. He earned his BS in computer science and information technology from IUT, Bangladesh, in 2003. He is currently an assistant professor in the Computer Science Department of IIUM. Until June 2010, he served as an assistant professor in the Computer Science and Engineering Department of BRAC University, Bangladesh. Prior to holding this position, he worked as a researcher at the networking lab of Kyung Hee University, South Korea, until August 2009.
Dr. Pathan’s research interests include wireless sensor networks, network security, and e-services technologies. He has been a recipient of several awards/best paper awards and has several publications in these areas. He has served as chair, an organizing committee member, and a technical program committee member in numerous international conferences/workshops, such as GLOBECOM, GreenCom, HPCS, IC A3PP, IWCMC, VTC, HPCC, and IDCS. He was awarded the IEEE Outstanding Leadership Award and Certificate of Appreciation for his role in the IEEE GreenCom ’13 conference.
He is currently serving an area editor of International Journal of Communication Networks and Information Security, editor of Inderscience International Journal of Computational Science and Engineering, associate editor of IASTED/ACTA Press International Journal of Computers and Applications, guest editor of many special issues of top-ranked journals, and editor/author of eleven books.
Top customer reviews
As I read further through the text, I may revise my review to target specific sections. However, it's not looking good.
Edit, 2-20: I can't believe it, but some of the algorithms - EVEN when corrected for formatting and code compilation errors - are just flat out wrong. The supposed Monoalphabetic Cipher discussed in Section 2.2 is a glorified Caesar Cipher discussed in Section 2.1! Necessarily, I MUST revise my rating to 1 star.