Foto dell'autore

Opere di Jennifer Seberry

Etichette

Informazioni generali

Sesso
female
Nazionalità
Australia
Premi e riconoscimenti
CSMA Medal (2008)

Utenti

Recensioni

Indeholder "Preface", "Chapter 1. Introduction", "Chapter 2. Background theory", "2.1 Mathematical methods", "2.2 Complexity theory", "2.3 Complexity of selected problems used in cryptology", "2.4 Information theory", "Chapter 3. Encryption methods of information protection", "3.1 Classical ciphers", "3.2 Symmetric algorithms and DES", "3.3 Asymmetric algorithms or public key cryptosystems", "Chapter 4. Authentication methods", "4.1 Elementary methods of message authentication", "4.2 Subliminal channel", "4.3 Digital signatures", "4.4 Other authentication techniques", "4.5 Summary", "Chapter 5. Cryptography in computer network security", "5.1 Information protection in computer networks", "5.2 Key management issues", "5.3 Electronic funds transfer (EFT)", "5.4 Summary", "Chapter 6. Application of cryptography in databases", "6.1 Database model", "6.2 Crytographic transformation preserving data structure", "6.3 Application of cryptography to protection of information during processing", "6.4 Privacy homomorphisms", "6.5 Summary", "Chapter 7. Other cryptographic techniques", "7.1 Linear feedback shift registers", "7.2 One-way ciphers and passwords", "7.3 Smart cards and information cards", "7.4 Unforgeable ID cards using smart cards", "7.5 Summary", "Chapter 8. Security in operating systems", "8.1 Access control in computer systems", "8.2 Implementations of access control systems", "8.3 Rationale for security evaluation classes", "8.4 Summary", "Chapter 9. Minimum knowledge systems", "9.1 An introduction to the minimum knowledge concept", "9.2 More on the Fiat-Shamir smart card protocol", "9.3 Subliminal free verification using minimum knowledge protocols", "9.4 Conclusion", "Appendix A", "A.1 Frequencies of occurrences of characters in languages", "A.2 Frequencies of occurrences of pairs of letters in languages", "Appendix B", "B.1 DES code", "B.2 Key representation for DES", "Appendix C. ", "C.1 Vigenere, Beauford or Variant Beauford code", "Bibliography", "Index".

Udmærket gennemgang af kryptering og brug til fx autentificering, identifikation og signering. Der er drysset virkende c-programmer ud rundt omkring i bogen, så man kan se teorien og virkeligheden side om side.
… (altro)
 
Segnalato
bnielsen | Jan 19, 2012 |

Potrebbero anche piacerti

Autori correlati

Statistiche

Opere
3
Utenti
17
Popolarità
#654,391
Voto
3.0
Recensioni
1
ISBN
7
Lingue
1