This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet security, which rely heavily on cryptographic ...
Commentary--In recent years, carriers/telephone companies, Internet service providers and others have rolled out managed network security services, which are in use today by hundreds of corporations ...