Добро пожаловать на сайт электронной библиотеки!
Здесь можно найти произведения русских и зарубежных авторов.
Скачать множество книг и журналов различных жанров и направлений.
Большой выбор художественной, бизнес, учебной и технической литературы.
Все представленные здесь книги и журналы имеют подробное описание и обложку.
Наша библиотека регулярно пополняется только новыми и интересными материалами!

«Подробнее о сайте»            «Правила сайта»            «Написать нам»            «Статьи»

Encyclopedia of Cryptography and Security

Наука и познание >> Энциклопедии/Справочники/Словари

Разместил: bennyblanko

3-10-2014, 17:20

Просмотров: 517

Encyclopedia of Cryptography and Security
As a critical enhancement to the First Edition’s base of 464 entries, the information in the Encyclopedia is relevant for researchers and professionals alike. Topics for this comprehensive reference were elected, written, and peer-reviewed by a pool of distinguished researchers in the field. The Second Edition’s editorial board now includes 34 scholars, which was expanded from 18 members in the First Edition. Representing the work of researchers from over 30 countries, the Encyclopedia is broad in scope, covering everything from authentication and identification to quantum cryptography and web security. The text’s practical style is instructional, yet fosters investigation. Each area presents concepts, designs, and specific implementations. The highly-structured essays in this work include synonyms, a definition and discussion of the topic, bibliographies, and links to related literature. Extensive cross-references to other entries within the Encyclopedia support efficient, user-friendly searches for immediate access to relevant information. Key concepts presented in the Encyclopedia of Cryptography and Security include: Authentication and identification; Block ciphers and stream ciphers; Computational issues; Copy protection; Cryptanalysis and security; Cryptographic protocols; Electronic payment and digital certificates; Elliptic curve cryptography; Factorization algorithms and primality tests; Hash functions and MACs; Historical systems; Identity-based cryptography; Implementation aspects for smart cards and standards; Key management; Multiparty computations like voting schemes; Public key cryptography; Quantum cryptography; Secret sharing schemes; Sequences; Web Security. Topics covered: Data Structures, Cryptography and Information Theory; Data Encryption; Coding and Information Theory; Appl.Mathematics/Computational Methods of Engineering; Applications of Mathematics; Complexity. This authoritative reference will be published in two formats: print and online. The online edition features hyperlinks to cross-references, in addition to significant research.

Название: Encyclopedia of Cryptography and Security
Автор: Van Tilborg H.C.A., Jajodia S.
Издательство: Springer
ISBN: 144195905X, 9781441959058
Год: 2011
Страниц: 1457
Формат: PDF
Язык: Английский
Размер: 32.2 Мб


Похожие публикации

Computer Security. Principles and Practice Computer Security. Principles and Practice
In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated,

Encyclopedia of environmental microbiology Encyclopedia of environmental microbiology
A single, comprehensive resource for researchers, scientists, and students in environmental microbiology In recent years, the field of environmental microbiology has taken on new importance. But even with a wealth of new research and new interest in

International Encyclopedia of Marketing International Encyclopedia of Marketing
With over 300 entries from hundreds of global experts, this is one of the premier marketing reference resources available worldwide.

Encyclopedia of Science & Technology Encyclopedia of Science & Technology
A tradition of excellence continues with the long-awaited Tenth Edition of McGraw-Hill's Encyclopedia of Science & Technology The definitive source for keeping up with the amazing changes in science and technology - complete with more than 1,700 new

History of Astronomy: An Encyclopedia History of Astronomy: An Encyclopedia
This Encyclopedia traces the history of the oldest science from the ancient world to the space age in over 300 entries by leading experts. From Booklist This new history of astronomy, in the form of an encyclopedia, is a welcome addition to the

Computer and Information Security Handbook Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they

Information Security and Ethics: Concepts, Methodologies, Tools and Applications Information Security and Ethics: Concepts, Methodologies, Tools and Applications
Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Cyber security, encompassing both information and network security, is of utmost importance in today's information age.

Cryptography and Network Security,4 Ed Cryptography and Network Security,4 Ed
В этом возрасте от вирусов и хакеров, электронного подслушивания и электронного мошенничества, безопасности имеет первостепенное значение. Как дисциплины криптографии и безопасности сети созрели, более практичный, легко доступных приложений для

Securing Wireless Communications at the Physical Layer Securing Wireless Communications at the Physical Layer
The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods

Отзывы и Комментарии

Добавление комментария

Ваше Имя:
Ваш E-Mail:(необязательно)
  • bowtiesmilelaughingblushsmileyrelaxedsmirk