IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Public-Key Cryptography

Public-Key Cryptography
View Sample PDF
Author(s): Eberhard Stickel (Hochschule der Sparkassen - Finanzgruppe University of Applied Sciences, Bonn GmbH, Germany)
Copyright: 2005
Pages: 5
Source title: Encyclopedia of Information Science and Technology, First Edition
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-553-5.ch418

Purchase

View Public-Key Cryptography on the publisher's website for pricing and purchasing information.

Abstract

Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).

Related Content

Tereza Raquel Merlo, Nayana Madali M. Pampapura, Jason M. Merlo. © 2024. 14 pages.
Kris Swen Helge. © 2024. 9 pages.
Ahmad Tasnim Siddiqui, Gulshaira Banu Jahangeer, Amjath Fareeth Basha. © 2024. 12 pages.
Jennie Lee Khun. © 2024. 19 pages.
Tereza Raquel Merlo. © 2024. 19 pages.
Akash Bag, Paridhi Sharma, Pranjal Khare, Souvik Roy. © 2024. 31 pages.
Akash Bag, Upasana Khattri, Aditya Agrawal, Souvik Roy. © 2024. 28 pages.
Body Bottom