Muutke küpsiste eelistusi

Symmetric Cryptographic Protocols Softcover reprint of the original 1st ed. 2014 [Pehme köide]

  • Formaat: Paperback / softback, 234 pages, kõrgus x laius: 235x155 mm, kaal: 3869 g, 1 Illustrations, color; 20 Illustrations, black and white; XVII, 234 p. 21 illus., 1 illus. in color., 1 Paperback / softback
  • Ilmumisaeg: 10-Sep-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319355007
  • ISBN-13: 9783319355009
  • Pehme köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 234 pages, kõrgus x laius: 235x155 mm, kaal: 3869 g, 1 Illustrations, color; 20 Illustrations, black and white; XVII, 234 p. 21 illus., 1 illus. in color., 1 Paperback / softback
  • Ilmumisaeg: 10-Sep-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319355007
  • ISBN-13: 9783319355009
This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.

Arvustused

From the book reviews:

Experienced security practitioners and cryptography researchers will benefit from reading this book. the book provides a thorough analysis of key distribution and predistribution techniques, alongside pertinent applications. I would recommend this book as an advanced-level resource on symmetric cryptography and its application to diverse application scenarios. (Zubair Baig, Computing Reviews, February, 2015)

Introduction.- Some Useful Constructions.- Non-scalable Key Distribution Schemes.- MLS for Internet Security Protocols.- Scalable Key Distribution Schemes.- Scalable Extensions of Non-scalable Schemes.- Using PKPSs With Tamper-Responsive Modules.- Broadcast Authentication and Broadcast Encryption.- Authenticated Data Structures.- Universal Trusted Computing Bases.- Conclusions and References.
Dr. Ramkumar is an Associate Professor, at the Dept. of CSE, MSU since August 2009.