Theory and practice of cryptography solutions for secure information systems / Atilla Elçi ... [et al.].
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9781466640306 ( hardcover)
- 21 005.8 T396 2013
Item type | Current library | Collection | Call number | Materials specified | Copy number | Status | Notes | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|---|
![]() |
Biblioteca William Corredor Gómez. Sede Cosmos (Barranquilla) | Reserva | 005.8 T396 2013 (Browse shelf(Opens below)) | Ej. 1 | Available | Colección 1, Isla 1, Lado B, Módulo 3 | 301254224 |
Section I. Cryptographic methods analysis: 1. Ontology-based analysis of cryptography standards and possibilities of their harmonization – 2. GOST encryption algorithm and approaches to its analysis – 3. Cryptography for the forensics investigator -- 4. Search in encrypted data: theoretical models and practical applications -- Section II. Cryptographic systems: 5. Encryption schemes with hyper-complex number systems and their hardware-oriented implementation -- 6. Design time engineering of side channel resistant cipher implementations -- Section III. Cryptographic solutions for distributed systems: 7. An efficient attribute-based signature with application to secure attribute-based messaging system -- 8. Secure neighbor discovery: a cryptographic solution for securing IPv6 local link operations -- 9. Offline/online security in mobile ad hoc networks -- 10. A survey on security in wireless sensor networks: attacks and defense mechanisms -- Section IV. Cryptographic trust solutions: 11. Secure multiparty computation via oblivious polynomial evaluation -- 12. PKI trust models -- 13. Entity authentication and trust validation in PKI using petname systems-- 14. Building a trusted environment for security applications -- 15. Enhancing security at email end point: a feasible task for fingerprint identification system -- Section V. Engineering secure information systems: 16. Cryptography in electronic mail -- 17. Theory and practice of secure e-voting systems – 18. Sealed-bid auction protocols – 19. Preserving the privacy of patient records in health monitoring systems.
There are no comments on this title.