TY - CHAP A1 - Saman Shojae Chaeikar A2 - Azizah Bt Abdul Manaf A3 - Mazdak Zamani ED1 - Jaydip Sen Y1 - 2012-03-07 PY - 2012 T1 - Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks N2 - The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. BT - Cryptography and Security in Computing SP - Ch. 10 UR - https://doi.org/10.5772/35329 DO - 10.5772/35329 SN - PB - IntechOpen CY - Rijeka Y2 - 2020-08-08 ER -