
Comprehensive Table of Contents ◾ 385
Domain 5 Cryptography
Title
Volume
1 2 3 4 5 6 7
5.1 Use of Cryptography
Auditing Cryptography: Assessing
System Security, Steve Stanek
x
Three New Models for the
Application of Cryptography, Jay
Heiser
x
5.2 Cryptographic Concepts, Methodologies, and Practices
Cryptographic Transitions, Ralph
Spencer Poore
x
Blind Detection of Steganographic
Content in Digital Images Using
Cellular Automata, Sasan Hamidi
x
An Overview of Quantum
Cryptography, Ben Rothke
x
Elliptic Curve Cryptography:
Delivering High-Performance
Security for E-Commerce and
Communications, Paul Lambert
x
Cryptographic Key Management
Concepts, Ralph Spencer ...