Kategorien
Konto
Anmelden / Registrieren
Warenkorb
 
 

Public Key Cryptography


Menge:  Stück  
Produktinformationen
cover
cover
Artikel-Nr.:
     5667A-9783540669678
Hersteller:
     Springer Verlag
Herst.-Nr.:
     9783540669678
EAN/GTIN:
     9783540669678
Suchbegriffe:
Allgemeine Informatikbücher
Bücher für Datenbanken - englischsp...
Datenbanken (Fachbücher)
Datenbankenbücher
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol.- An Efficient NICE-Schnorr-Type Signature Scheme.- Identification of Bad Signatures in Batches.- Some Remarks on a Fair Exchange Protocol.- Gaudry's Variant against C ab Curves.- An Identification Scheme Based on Sparse Polynomials.- A State-Based Model for Certificate Management Systems.- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence.- The Composite Discrete Logarithm and Secure Authentication.- Chosen-Ciphertext Security for Any One-Way Cryptosystem.- Short Proofs of Knowledge for Factoring.- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.- All-or-Nothing Transform and Remotely Keyed Encryption Protocols.- Security of Public Key Certificate Based Authentication Protocols.- Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2.- Key Recovery in Third Generation Wireless Communication Systems.- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications.- Certificates of Recoverability with Scalable Recovery Agent Security.- Design Validations for Discrete Logarithm Based Signature Schemes.- Optimally Efficient Accountable Time-Stamping.- "Pseudorandom Intermixing": A Tool for Shared Cryptography.- RSA-Based Auto-recoverable Cryptosystems.- Efficient and Fresh Certification.- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions.- Cryptographic Approaches to Privacy in Forensic DNA Databases.- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes.- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ).- An Auction Protocol Which Hides Bids of Losers.- Forward Secrecy and Its Application to Future MobileCommunications Security.- Selecting Cryptographic Key Sizes.- A Structured ElGamal-Type Multisignature Scheme.
Weitere Informationen:
Author:
Hideki Imai; Yuliang Zheng
Verlag:
Springer Berlin
Sprache:
eng
Weitere Suchbegriffe: allgemeine Informatikbücher - englischsprachig, bücher für datenbanken - englischsprachig, Datenverarbeitung / Datenverschlüsselung, Kryptografie, authentication; cryptographic protocols; digital signatures; elliptic curve Public Key Cryptosystems; Shared cryptography; security; Algorithm analysis and problem complexity, Authentication, Cryptographic Protocols, Digital Signatures, Elliptic Curve Cryptography, Public Key Cryptography, Public Key Cryptosystems, Shared Cryptography, cryptography, security
Die Konditionen im Überblick1
Lieferzeit
Lagerstand
Preis
€ 49,99*
Konditionen selbst auswählen
Artikel empfehlenArtikel merken
* Preise mit Sternchen sind Nettopreise zzgl. gesetzlich gültiger MwSt.
UVP bedeutet „Unverbindliche Preisempfehlung“
Unser Angebot richtet sich ausschließlich an Unternehmen, Gewerbetreibende und Freiberufler.