Encryption for Digital Content: Advances in Information Security, cartea 52
Autor Aggelos Kiayias, Serdar Pehlivanogluen Limba Engleză Paperback – 25 dec 2012
Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 603.21 lei 6-8 săpt. | |
Springer Us – 25 dec 2012 | 603.21 lei 6-8 săpt. | |
Hardback (1) | 609.08 lei 6-8 săpt. | |
Springer Us – 2 noi 2010 | 609.08 lei 6-8 săpt. |
Din seria Advances in Information Security
- 20% Preț: 613.11 lei
- 20% Preț: 1103.97 lei
- 20% Preț: 604.99 lei
- 15% Preț: 603.66 lei
- 20% Preț: 613.60 lei
- 20% Preț: 1091.17 lei
- 18% Preț: 951.66 lei
- 20% Preț: 516.40 lei
- 20% Preț: 1100.54 lei
- 18% Preț: 1586.09 lei
- 20% Preț: 884.18 lei
- 20% Preț: 1109.89 lei
- 18% Preț: 898.91 lei
- 20% Preț: 943.07 lei
- 20% Preț: 610.64 lei
- 20% Preț: 609.36 lei
- 15% Preț: 607.37 lei
- 20% Preț: 613.43 lei
- 20% Preț: 613.90 lei
- 20% Preț: 618.11 lei
- 20% Preț: 609.05 lei
- 20% Preț: 606.57 lei
- 15% Preț: 605.85 lei
- 15% Preț: 603.82 lei
- 20% Preț: 777.15 lei
- 18% Preț: 1154.49 lei
- 15% Preț: 606.15 lei
- 24% Preț: 693.62 lei
- 15% Preț: 605.68 lei
Preț: 603.21 lei
Preț vechi: 709.66 lei
-15% Nou
Puncte Express: 905
Preț estimativ în valută:
115.51€ • 124.94$ • 96.25£
115.51€ • 124.94$ • 96.25£
Carte tipărită la comandă
Livrare economică 11-25 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781461427216
ISBN-10: 1461427215
Pagini: 224
Ilustrații: XIII, 209 p.
Dimensiuni: 155 x 235 x 12 mm
Greutate: 0.32 kg
Ediția:2010
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
ISBN-10: 1461427215
Pagini: 224
Ilustrații: XIII, 209 p.
Dimensiuni: 155 x 235 x 12 mm
Greutate: 0.32 kg
Ediția:2010
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
Public țintă
Professional/practitionerCuprins
Fingerprinting Codes.- Broadcast Encryption.- Traitor Tracing.- Trace and Revoke Schemes.- Pirate Evolution.
Recenzii
From the reviews:
“This book provides several cryptographic mechanisms for protecting digital content. … With the necessary prerequisites, even readers with no prior knowledge of cryptography can gain a basic understanding of this field. … each chapter ends with a detailed bibliographic note, which is useful for further study. The book is based in part on Pehlivanoglu’s doctoral thesis, which implies that it will provide a state-of-the-art overview of encryption for digital content. … Overall, I recommend this survey of digital content encryption for cryptographers and professional engineers.” (Zheng Gong, ACM Computing Reviews, May, 2011)
“This book provides several cryptographic mechanisms for protecting digital content. … With the necessary prerequisites, even readers with no prior knowledge of cryptography can gain a basic understanding of this field. … each chapter ends with a detailed bibliographic note, which is useful for further study. The book is based in part on Pehlivanoglu’s doctoral thesis, which implies that it will provide a state-of-the-art overview of encryption for digital content. … Overall, I recommend this survey of digital content encryption for cryptographers and professional engineers.” (Zheng Gong, ACM Computing Reviews, May, 2011)
Caracteristici
First book to combine exposition of underlying mathematics, attack models and parameter analysis Includes a complete description of broadcast encryption with various revocation and tracing functionalities Provides a solid treatment on this subject Includes supplementary material: sn.pub/extras