17.01.447
005.8 - Data security, access control, computer network security, firewalls
Buku - Circulation (Dapat Dipinjam)
Computer Security, Cryptography,
4
14 kali
Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It explains why "textbook crypto" isonly good in an ideal world where data are random and bad guys behave nicely.It reveals the general unfitness of "textbook crypto" for the real world by demonstratingnumerous attacks on such schemes, protocols and systems under variousreal-world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography.
Tersedia 2 dari total 2 Koleksi
Nama | Wenbo Mao |
Jenis | Perorangan |
Penyunting | |
Penerjemah |
Nama | Prentice Hall |
Kota | Upper Sadle River, New Jersey |
Tahun | 2004 |
Harga sewa | IDR 0,00 |
Denda harian | IDR 1.000,00 |
Jenis | Sirkulasi |