Document Type

Article

Rights

Available under a Creative Commons Attribution Non-Commercial Share Alike 4.0 International Licence

Disciplines

Applied mathematics

Publication Details

Lecture Notes, Centre for Advanced Studies, Warsaw University of Technology, Warsaw 2011

For additional information on this series, visit the CAS Publications Website at

http://www.csz.pw.edu.pl/index.php/en/publications

Abstract

Developing methods for ensuring the secure exchange of information is one of the oldest occupations in history. With the revolution in Information Technology, the need for securing information and the variety of methods that have been developed to do it has expanded rapidly. Much of the technology that forms the basis for many of the techniques used today was originally conceived for use in military communications and has since found a place in a wide range of industrial and commercial sectors. This has led to the development of certain industry standards that are compounded in specific data processing algorithms together with the protocols and procedures that are adopted in order to implement them. These standards are of course continually scrutinized for their effectiveness and undergo improvements and/or changes as required.

DOI

10.21427/D7ZS63


Share

COinS