De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger i Chapman & Hall/CRC Cryptography and Network Security Series serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • - Third Edition
    af College Park, Ramat Gan, USA) Katz, mfl.
    1.212,95 kr.

  •  
    1.923,95 kr.

    Mathematicians have skills that would enable them to use data to answer questions important to them and others, and report those answers in compelling ways. Data science combines parts of mathematics, statistics, computer science. This handbook will assist mathematicians to better understand the opportunities presented by data science.

  • af Craig (York College of Pennsylvania Bauer
    1.500,95 kr.

  •  
    1.180,95 kr.

    This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes.

  • af Lidong Chen
    2.378,95 kr.

    Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience.

  • af Maria Isabel Gonzalez Vasco
    1.343,95 kr.

    Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic constructions. This title focuses on the specifics of using nonabelian groups in the field of cryptography. It provides an introduction to cryptography with emphasis on group theoretic constructions.

  • - A Logical Approach
    af Shiu-Kai Chin
    1.349,95 kr.

    Using propositional modal logic to explain access control principles, this work provides the mathematical means to comprehend, analyze, create and verify the policies and control mechanisms used to protect resources. It is suitable for those designing, implementing and verifying computer and information systems.

  •  
    1.726,95 kr.

    Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. This book applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more.

  • af Antoine (Universite de Versailles Saint-Quentin-en-Yvelines Joux
    1.640,95 kr.

    Illustrating the power of algorithms, this book describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.

  • af M. Jason Hinek
    1.349,95 kr.

    Focusing on mathematical attacks that exploit the structure of RSA and specific parameter choices, this book provides a collection of well-known attacks on RSA and its main variants, including CRT-RSA, multi-prime RSA, and multi-power RSA. It treats the cryptanalysis of the main variants of RSA as a major topic.

  • af Douglas Jacobson
    1.224,95 kr.

    Discusses network architecture, the functions of layers in a typical network, and network based attacks including header, protocol, and authentication attacks. This book provides an understanding of the vulnerabilities and mechanisms of each layer of network security. It also presents homework problems, laboratory experiments, and appendices.