Symmetric Cryptographic Protocols
Autor Mahalingam Ramkumaren Limba Engleză Paperback – 10 sep 2016
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 625.34 lei 6-8 săpt. | |
Springer International Publishing – 10 sep 2016 | 625.34 lei 6-8 săpt. | |
Hardback (1) | 631.45 lei 6-8 săpt. | |
Springer International Publishing – 19 aug 2014 | 631.45 lei 6-8 săpt. |
Preț: 625.34 lei
Preț vechi: 735.69 lei
-15% Nou
Puncte Express: 938
Preț estimativ în valută:
119.68€ • 124.31$ • 99.41£
119.68€ • 124.31$ • 99.41£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319355009
ISBN-10: 3319355007
Pagini: 251
Ilustrații: XVII, 234 p. 21 illus., 1 illus. in color.
Dimensiuni: 155 x 235 x 13 mm
Greutate: 0.36 kg
Ediția:Softcover reprint of the original 1st ed. 2014
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319355007
Pagini: 251
Ilustrații: XVII, 234 p. 21 illus., 1 illus. in color.
Dimensiuni: 155 x 235 x 13 mm
Greutate: 0.36 kg
Ediția:Softcover reprint of the original 1st ed. 2014
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Introduction.- Some Useful Constructions.- Non-scalable Key Distribution Schemes.- MLS for Internet Security Protocols.- Scalable Key Distribution Schemes.- Scalable Extensions of Non-scalable Schemes.- Using PKPSs With Tamper-Responsive Modules.- Broadcast Authentication and Broadcast Encryption.- Authenticated Data Structures.- Universal Trusted Computing Bases.- Conclusions and References.
Recenzii
From the book reviews:
“Experienced security practitioners and cryptography researchers will benefit from reading this book. … the book provides a thorough analysis of key distribution and predistribution techniques, alongside pertinent applications. I would recommend this book as an advanced-level resource on symmetric cryptography and its application to diverse application scenarios.” (Zubair Baig, Computing Reviews, February, 2015)
“Experienced security practitioners and cryptography researchers will benefit from reading this book. … the book provides a thorough analysis of key distribution and predistribution techniques, alongside pertinent applications. I would recommend this book as an advanced-level resource on symmetric cryptography and its application to diverse application scenarios.” (Zubair Baig, Computing Reviews, February, 2015)
Notă biografică
Dr. Ramkumar is an Associate Professor, at the Dept. of CSE, MSU since August 2009.
Textul de pe ultima copertă
This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.
• Provides detailed coverage of symmetric key protocols
• Describes various applications of symmetric building blocks
• Includes strategies for constructing compact and efficient digests of dynamic databases
• Provides detailed coverage of symmetric key protocols
• Describes various applications of symmetric building blocks
• Includes strategies for constructing compact and efficient digests of dynamic databases
Caracteristici
Provides a detailed coverage of symmetric key protocols Presents the applications of symmetric building blocks Discusses in-depth coverage on the topic of symmetric key protocols Includes supplementary material: sn.pub/extras