Practical Signcryption: Information Security and Cryptography
Editat de Alexander W. Dent, Yuliang Zheng Cuvânt înainte de Moti Yungen Limba Engleză Paperback – 2 ian 2013
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 595.04 lei 38-44 zile | |
Springer Berlin, Heidelberg – 2 ian 2013 | 595.04 lei 38-44 zile | |
Hardback (1) | 603.67 lei 38-44 zile | |
Springer Berlin, Heidelberg – 12 noi 2010 | 603.67 lei 38-44 zile |
Din seria Information Security and Cryptography
- 20% Preț: 355.23 lei
- 20% Preț: 770.27 lei
- 20% Preț: 303.84 lei
- 20% Preț: 1423.46 lei
- 20% Preț: 932.04 lei
- 20% Preț: 327.09 lei
- 20% Preț: 623.53 lei
- 20% Preț: 453.20 lei
- 20% Preț: 595.06 lei
- 20% Preț: 324.74 lei
- 20% Preț: 398.13 lei
- 20% Preț: 339.59 lei
- 18% Preț: 931.26 lei
- 24% Preț: 795.23 lei
- 20% Preț: 487.70 lei
- Preț: 450.24 lei
- 20% Preț: 877.73 lei
- 20% Preț: 325.70 lei
- 20% Preț: 410.16 lei
- 20% Preț: 636.14 lei
- 20% Preț: 552.70 lei
- 20% Preț: 577.37 lei
- 20% Preț: 640.16 lei
- 20% Preț: 673.04 lei
- 20% Preț: 327.80 lei
- 20% Preț: 406.37 lei
- 20% Preț: 627.74 lei
Preț: 595.04 lei
Preț vechi: 743.79 lei
-20% Nou
Puncte Express: 893
Preț estimativ în valută:
113.87€ • 119.79$ • 94.28£
113.87€ • 119.79$ • 94.28£
Carte tipărită la comandă
Livrare economică 10-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642265938
ISBN-10: 3642265936
Pagini: 292
Ilustrații: XVIII, 274 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.41 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Information Security and Cryptography
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642265936
Pagini: 292
Ilustrații: XVIII, 274 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.41 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Information Security and Cryptography
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Security Models for Signcryption.- Security for Signcryption: The Two-User Model.- Security for Signcryption: The Multi-User Model.- Signcryption Schemes.- Signcryption Schemes Based on the Diffie–Hellman Problem.- Signcryption Schemes Based on Bilinear Maps.- Signcryption Schemes Based on the RSA Problem.- Construction Techniques.- Hybrid Signcryption.- Concealment and Its Applications to Authenticated Encryption.- Parallel Signcryption.- Extensions of Signcryption.- Identity-Based Signcryption.- Key Establishment Using Signcryption Techniques.- Applications of Signcryption.
Recenzii
From the reviews:
“In this book, editors Dent and Zheng consolidate the research work done for the advancement of signcryption technology. … The book is primarily intended for communication design engineers, communication system analysts, and security analysts, as well as enthusiastic researchers at large.” (Zubair Baig, ACM Computing Reviews, July, 2011)
“In this book, editors Dent and Zheng consolidate the research work done for the advancement of signcryption technology. … The book is primarily intended for communication design engineers, communication system analysts, and security analysts, as well as enthusiastic researchers at large.” (Zubair Baig, ACM Computing Reviews, July, 2011)
Textul de pe ultima copertă
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else.The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.
Caracteristici
First book on this topic The second editor invented the term "Signcryption" A comprehensive treatment, suitable as a handbook on the subject Includes supplementary material: sn.pub/extras