Cryptography: Deciphering Its Progress

Cryptography: Deciphering Its Progress

Leslie Leong, Andrzej T. Jarmoszko
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3.ch231
Cite Chapter Cite Chapter

MLA

Leong, Leslie, and Andrzej T. Jarmoszko. "Cryptography: Deciphering Its Progress." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 3442-3450. https://doi.org/10.4018/978-1-59904-937-3.ch231

APA

Leong, L. & Jarmoszko, A. T. (2008). Cryptography: Deciphering Its Progress. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 3442-3450). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch231

Chicago

Leong, Leslie, and Andrzej T. Jarmoszko. "Cryptography: Deciphering Its Progress." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 3442-3450. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch231

Export Reference

Mendeley
Favorite

Abstract

The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and white-collar crimes, the demand for a stronger security mechanism in cryptography becomes apparent. Although wireless cryptography is still in its infancy, there are encryption technologies that may support the limitations of a mobile device.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.