A Light-Weight e-Voting System with Distributed Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
Algorithms for computing parameters of graph-based extensions of BCH codes
Journal of Discrete Algorithms
Taming the diversity of information assurance & security
Journal of Computing Sciences in Colleges
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
Data transmission encryption and decryption algorithm in network security
SMO'06 Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization
New algorithms and protocols for information authentication in automatic control systems
Automation and Remote Control
A unified architecture for a public key cryptographic coprocessor
Journal of Systems Architecture: the EUROMICRO Journal
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
Information Security and Cryptology
Revisiting the Karnin, Greene and Hellman Bounds
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Methods of finding multiplicative inverses in GF(28)
Computer Communications
Strategic planning for the computer science security
WSEAS Transactions on Computers
Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Automation and Remote Control
Collect and broadcast news in security
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
On Mobile Agents Resistance to Traffic Analysis
Electronic Notes in Theoretical Computer Science (ENTCS)
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
Distributed private matching and set operations
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Crypto topics and applications II
Algorithms and theory of computation handbook
Verification of stored security data in computer system
ACIIDS'10 Proceedings of the Second international conference on Intelligent information and database systems: Part I
Dynamic threshold and cheater resistance for shamir secret sharing scheme
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Addressing new challenges by building security protocols around graphs
Proceedings of the 11th international conference on Security Protocols
Video surveillance: a distributed approach to protect privacy
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Mobile agents: preserving privacy and anonymity
IMTCI'04 Proceedings of the Second international conference on Intelligent Media Technology for Communicative Intelligence
Rateless codes for the multicast stream authentication problem
IWSEC'06 Proceedings of the 1st international conference on Security
Achieving multicast stream authentication using MDS codes
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Construction of highly nonlinear resilient S-boxes with given degree
Designs, Codes and Cryptography
Allowing continuous evaluation of citizen opinions through social networks
EGOVIS'12/EDEM'12 Proceedings of the 2012 Joint international conference on Electronic Government and the Information Systems Perspective and Electronic Democracy, and Proceedings of the 2012 Joint international conference on Advancing Democracy, Government and Governance
Alternative mechanisms for information security
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Hi-index | 0.00 |
From the Publisher:The book studies modern concepts of Computer Security. It is selfcontained in the sense that it introduces the basic mathematical background necessary to follow computer security concepts. Next we examine modern developments in Cryptography starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, identification and finishing with an introduction to modern e-business systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.