000 | 02735nam a2200289 a 4500 | ||
---|---|---|---|
005 | 20170904131344.0 | ||
008 | 161207s2013 xxua|||| |||| 00| 0deng d | ||
020 | _a9781466640306 ( hardcover) | ||
041 | 0 | _aeng | |
082 | 0 | 4 |
_221 _a005.8 _bT396 2013 |
245 | 0 | 0 |
_aTheory and practice of cryptography solutions for secure information systems / _cAtilla Elçi ... [et al.]. |
260 |
_aHershey PA : _bIGI Global, _c2013. |
||
300 |
_axxvi, 583 p. : _bil. ; _c29.cm. |
||
490 | 1 | _aAdvances in information security, privacy, and ethics (AISPE) | |
505 | 0 | _aSection I. Cryptographic methods analysis: 1. Ontology-based analysis of cryptography standards and possibilities of their harmonization – 2. GOST encryption algorithm and approaches to its analysis – 3. Cryptography for the forensics investigator -- 4. Search in encrypted data: theoretical models and practical applications -- Section II. Cryptographic systems: 5. Encryption schemes with hyper-complex number systems and their hardware-oriented implementation -- 6. Design time engineering of side channel resistant cipher implementations -- Section III. Cryptographic solutions for distributed systems: 7. An efficient attribute-based signature with application to secure attribute-based messaging system -- 8. Secure neighbor discovery: a cryptographic solution for securing IPv6 local link operations -- 9. Offline/online security in mobile ad hoc networks -- 10. A survey on security in wireless sensor networks: attacks and defense mechanisms -- Section IV. Cryptographic trust solutions: 11. Secure multiparty computation via oblivious polynomial evaluation -- 12. PKI trust models -- 13. Entity authentication and trust validation in PKI using petname systems-- 14. Building a trusted environment for security applications -- 15. Enhancing security at email end point: a feasible task for fingerprint identification system -- Section V. Engineering secure information systems: 16. Cryptography in electronic mail -- 17. Theory and practice of secure e-voting systems – 18. Sealed-bid auction protocols – 19. Preserving the privacy of patient records in health monitoring systems. | |
650 | 1 | 4 |
_920921 _aComputer security |
650 | 1 | 4 |
_920922 _aData encryption (Computer science) |
650 | 1 | 4 |
_920788 _aComputer networks _xSecurity measures |
700 | 1 |
_920923 _aElçi, Atilla |
|
700 | 1 |
_920924 _aPieprzyk, Josef |
|
700 | 1 |
_920926 _aChefranov, Alexander G. |
|
700 | 1 |
_920927 _aOrgun, Mehmet A. |
|
700 | 1 |
_920928 _aWang, Huaxiong |
|
700 | 1 |
_920929 _aShankaran, Rajan |
|
830 |
_920791 _aAdvances in information security, privacy, and ethics (AISPE) |
||
942 |
_2ddc _cBK _h005.8 _iT396 2013 _02 |
||
999 |
_c61853 _d61853 |