Information Security and Privacy
Editat de Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberryen Limba Engleză Paperback – 17 mar 1999
Preț: 323.62 lei
Preț vechi: 404.53 lei
-20% Nou
Puncte Express: 485
Preț estimativ în valută:
57.27€ • 67.15$ • 50.29£
57.27€ • 67.15$ • 50.29£
Carte tipărită la comandă
Livrare economică 06-20 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540657569
ISBN-10: 3540657568
Pagini: 348
Ilustrații: XII, 332 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.53 kg
Ediția:1999
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540657568
Pagini: 348
Ilustrații: XII, 332 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.53 kg
Ediția:1999
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Boolean Functions.- Boolean Function Design Using Hill Climbing Methods.- Enumeration of Correlation Immune Boolean Functions.- On the Symmetric Property of Homogeneous Boolean Functions.- Key Management.- Publicly Verifiable Key Escrow with Limited Time Span.- Accelerating Key Establishment Protocols for Mobile Communication.- Conference Key Agreement from Secret Sharing.- Cryptanalysis.- On m-Permutation Protection Scheme against Modification Attack.- Inversion Attack and Branching.- Signatures.- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature.- Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes.- RSA Cryptosystems.- On the Security of an RSA Based Encryption Scheme.- Generalised Cycling Attacks on RSA and Strong RSA Primes.- RSA Acceleration with Field Programmable Gate Arrays.- Group Cryptography.- Changing Thresholds in the Absence of Secure Channels.- A Self-Certified Group-Oriented Cryptosystem without a Combiner.- Network Security.- Companion Viruses and the Macintosh: Threats and Countermeasures.- An Implementation of a Secure Version of NFS Including RBAC.- Electronic Commerce.- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems.- Effient Electronic Cash Using Batch Signatures.- Evolution of Fair Non-repudiation with TTP.- Access Control.- Authorization in Object Oriented Databases.- An Analysis of Access Control Models.- Odds and Ends.- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems.- Characterization of Optimal Authentication Codes with Arbitration.- A Functional Cryptosystem Using a Group Action.
Caracteristici
Includes supplementary material: sn.pub/extras