skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Advances of DNA computing in cryptography Preview this item
ClosePreview this item
Checking...

Advances of DNA computing in cryptography

Author: Suyel Namasudra; Ganesh Chandra Deka
Publisher: Milton : Chapman and Hall/CRC, [2019]
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:

"This book discusses the current technologies of cryptography using DNA computing. It provides a judicious mix of concepts, solved examples and real life case studies"--

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Namasudra, Suyel.
Advances of DNA Computing in Cryptography.
Milton : Chapman and Hall/CRC, ©2018
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Suyel Namasudra; Ganesh Chandra Deka
ISBN: 9781351011396 1351011391 9781351011419 1351011413 9781351011389 1351011383 9781351011402 1351011405
OCLC Number: 1053824673
Description: 1 online resource (199 pages)
Contents: Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; Editors; Authors; Contributors; 1: Introduction of DNA Computing in Cryptography; Suyel Namasudra and Ganesh Chandra Deka; 2: Implementation of Public Key Cryptography in DNA Cryptography; Alo Sen, Rahul Roy, and Satya Ranjan Dash; 3: Taxonomy of DNA-Based Security Models; Suyel Namasudra; 4: Novel Data Encryption Scheme Using DNA Computing; Kintaali Abhimanyu Kumar Patro and Bibhudendra Acharya; 5: Application of DNA Computing in the Cloud Computing Environment; Debashree Devi. 6: Taxonomy of Security Attacks in DNA ComputingSelvaraj Karthikeyan, Patan Rizwan, and Balusamy Balamurugan; 7: Security, Privacy, Trust, and Anonymity; Suyel Namasudra, Debashree Devi, Sandeep Choudhary, Rizwan Patan, and Suresh Kallam; 8: DNA Computing Algorithm; Awanish Kumar; 9: Applications and Future Trends of DNA Computing; Suyel Namasudra, Ganesh Chandra Deka, and Rohan Bali; Index.
Responsibility: edited by Suyel Namasudra and Ganesh Chandra Deka.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1053824673<\/a>> # Advances of DNA computing in cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1053824673<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Place\/milton<\/a>> ; # Milton<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/molecular_computers<\/a>> ; # Molecular computers<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.824\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/computers_security_cryptography<\/a>> ; # COMPUTERS--Security--Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/cryptography_data_processing<\/a>> ; # Cryptography--Data processing<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/data_encryption_computer_science<\/a>> ; # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Person\/namasudra_suyel<\/a>> ; # Suyel Namasudra<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Person\/deka_ganesh_chandra_1969<\/a>> ; # Ganesh Chandra Deka<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; Editors; Authors; Contributors; 1: Introduction of DNA Computing in Cryptography; Suyel Namasudra and Ganesh Chandra Deka; 2: Implementation of Public Key Cryptography in DNA Cryptography; Alo Sen, Rahul Roy, and Satya Ranjan Dash; 3: Taxonomy of DNA-Based Security Models; Suyel Namasudra; 4: Novel Data Encryption Scheme Using DNA Computing; Kintaali Abhimanyu Kumar Patro and Bibhudendra Acharya; 5: Application of DNA Computing in the Cloud Computing Environment; Debashree Devi.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5266898773<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/5266898773#CreativeWork\/advances_of_dna_computing_in_cryptography<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Advances of DNA computing in cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1053824673<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1053824673#PublicationEvent\/milton_chapman_and_hall_crc_2019<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Agent\/chapman_and_hall_crc<\/a>> ; # Chapman and Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5509993<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.taylorfrancis.com\/books\/9781351011419<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/nls.ldls.org.uk\/welcome.html?ark:\/81055\/vdc_100066379156.0x000001<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1201\/9781351011419<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1893096<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.lib.uwo.ca\/cgi-bin\/ezpauthn.cgi?url=http:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5509993<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/dx.doi.org\/10.1201\/9781351011419<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351011402<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351011389<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351011396<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351011419<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1053824673<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.824\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dx.doi.org\/10.1201\/9781351011419<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:IndividualProduct<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Agent\/chapman_and_hall_crc<\/a>> # Chapman and Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Chapman and Hall\/CRC<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Person\/deka_ganesh_chandra_1969<\/a>> # Ganesh Chandra Deka<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1969<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Deka<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Ganesh Chandra<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Ganesh Chandra Deka<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Person\/namasudra_suyel<\/a>> # Suyel Namasudra<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Namasudra<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Suyel<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Suyel Namasudra<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Place\/milton<\/a>> # Milton<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Milton<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/computers_security_cryptography<\/a>> # COMPUTERS--Security--Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/cryptography_data_processing<\/a>> # Cryptography--Data processing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography--Data processing<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/data_encryption_computer_science<\/a>> # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data encryption (Computer science)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Topic\/molecular_computers<\/a>> # Molecular computers<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Molecular computers<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/5266898773#CreativeWork\/advances_of_dna_computing_in_cryptography<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Advances of DNA Computing in Cryptography.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1053824673<\/a>> ; # Advances of DNA computing in cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351011389<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351011383<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351011389<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351011396<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351011391<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351011396<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351011402<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351011405<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351011402<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351011419<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351011413<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351011419<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1053824673<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1053824673<\/a>> ; # Advances of DNA computing in cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-01-22<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1053824673#PublicationEvent\/milton_chapman_and_hall_crc_2019<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Place\/milton<\/a>> ; # Milton<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5266898773#Agent\/chapman_and_hall_crc<\/a>> ; # Chapman and Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n