Practical Cryptography: Algorithms and Implementations Using C++
Author: Saiful Azad (Editor), Al-Sakib Khan Pathan (Editor)
Publisher finelybook 出版社: Auerbach Publications
Edition 版本: 1st edition
Publication Date 出版日期: 2014-11-17
Language 语言: English
Print Length 页数: 365 pages
ISBN-10: 1482228890
ISBN-13:9781482228892
Book Description
Book Description
About the Author
Saiful Azad received his PhD in information engineering at University of Padova, Italy in 2013. He completed his B.Sc. from IUT, Bangladesh in computer and information technology, and M.Sc. from IIUM, Malaysia in computer and information engineering. After completion of his PhD, he joined as a faculty member in the Department of Computer Science at American International University – Bangladesh (AIUB). He started working on Underwater Acoustic Networks during his PhD and still it remains his main focus of research. His research interests also lie in designing and implementing communication protocols for any network architecture, QoS issues, network security, and simulator design. He is one of the developers of the DESERT underwater simulator. He is also the author of more than 30 scientific papers published in international peer-reviewed journals or conferences. He has served as a technical program committee member in numerous international conferences/workshops. He also serves as a reviewer of a couple of renowned peer-reviewed journals and conferences.
Al-Sakib Khan Pathan earned his PhD (MS leading to PhD) in computer engineering in 2009 from Kyung Hee University in South Korea. He earned his BS in computer science and information technology from IUT, Bangladesh, in 2003. He is currently an assistant professor in the Computer Science Department of IIUM. Until June 2010, he served as an assistant professor in the Computer Science and Engineering Department of BRAC University, Bangladesh. Prior to holding this position, he worked as a researcher at the networking lab of Kyung Hee University, South Korea, until August 2009.
Dr. Pathan’s research interests include wireless sensor networks, network security, and e-services technologies. He has been a recipient of several awards/best paper awards and has several publications in these areas. He has served as chair, an organizing committee member, and a technical program committ
下载地址
相关推荐
Python for Bioinformatics: Using machine learning for drug discovery, cluster analysis, and phylogenetics
Docker Deep Dive: Zero to Docker in a single book! 2025 Edition
Bivariate Integer-Valued Time Series Models: Bivariate Models
Fundamentals of O-RAN
Ninety-Nine Lessons in Critical Thinking
5G New Radio in Bullets