Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Public-Key Cryptography

Public-Key Cryptography
View Sample PDF
Author(s): Eberhard Stickel (Hochschule der Sparkassen - Finanzgruppe University of Applied Sciences, Bonn GmbH, Germany)
Copyright: 2005
Pages: 5
Source title: Encyclopedia of Information Science and Technology, First Edition
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-553-5.ch418


View Public-Key Cryptography on the publisher's website for pricing and purchasing information.


Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).

Related Content

Adeyinka Tella, Oluwakemi Titilola Olaniyi, Aderinola Ololade Dunmade. © 2021. 24 pages.
Md. Maidul Islam. © 2021. 17 pages.
Peterson Dewah. © 2021. 23 pages.
Lungile Precious Luthuli, Thobekile K. Buthelezi. © 2021. 14 pages.
Delight Promise Udochukwu, Chidimma Oraekwe. © 2021. 13 pages.
Julie Moloi. © 2021. 18 pages.
Mandisa Msomi, Lungile Preciouse Luthuli, Trywell Kalusopa. © 2021. 17 pages.
Body Bottom