Encyclopedia of Cryptography and Security / Encyclopedia of Cryptography and Security (eBook)

eBook Download: PDF
2014 | 2nd ed. 2011
LXXX, 1416 Seiten
Springer US (Verlag)
978-1-4419-5906-5 (ISBN)

Lese- und Medienproben

Encyclopedia of Cryptography and Security / Encyclopedia of Cryptography and Security -
Systemvoraussetzungen
593,81 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition  5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security. As a critical enhancement to the First Edition’s base of 464 entries, the information in the Encyclopedia is relevant for researchers and professionals alike. Topics for this comprehensive reference were elected, written, and peer-reviewed by a pool of distinguished researchers in the field. The Second Edition’s editorial board now includes 34 scholars, which was expanded from 18 members in the First Edition. Representing the work of researchers from over 30 countries, the Encyclopedia is broad in scope, covering everything from authentication and identification to quantum cryptography and web security. The text’s practical style is instructional, yet fosters investigation. Each area presents concepts, designs, and specific implementations. The highly-structured essays in this work include synonyms, a definition and discussion of the topic, bibliographies, and links to related literature.  Extensive cross-references to other entries within the Encyclopedia support efficient, user-friendly searches for immediate access to relevant information.  Key concepts presented in the Encyclopedia of Cryptography and Security include: Authentication and identification; Block ciphers and stream ciphers; Computational issues; Copy protection; Cryptanalysis and security; Cryptographic protocols; Electronic payment and digital certificates; Elliptic curve cryptography; Factorization algorithms and primality tests; Hash functions and MACs; Historical systems; Identity-based cryptography; Implementation aspects for smart cards and standards; Key management; Multiparty computations like voting schemes; Public key cryptography; Quantum cryptography; Secret sharing schemes; Sequences; Web Security. Topics covered: Data Structures, Cryptography and Information Theory; Data Encryption; Coding and Information Theory; Appl.Mathematics/Computational Methods of Engineering; Applications of Mathematics; Complexity. This authoritative reference will be published in two formats: print and online.  The online edition features hyperlinks to cross-references, in addition to significant research.  

Henk C.A. van Tilborg is the Scientific Director of the research school EIDMA (Euler Institute for DiscreteMathematics and its Applications) and the Eindhoven Institute for the Protection of Systems and Information EIPSI. He is a board member ofWIC (Werkgemeenschap voor Informatie en Communicatietheorie). Dr. van Tilborg received his M.Sc. () and Ph.D. degree () from the Eindhoven University of Technology, the Netherlands. He was working as associate professor at the university, before he became a full professor in. During – he also served a part-time professorship at the Dutch Open University. He has also been a visiting professor at California Institute of Technology, the University of Pretoria and Macquarie University and visiting scientist at the IBM Almaden Research Center and Bell Laboratories. He has been involved in the organization ofmany international conferences.He was the program committee co-chair of ISIT- (IEEE International Symposium on InformationTheory), Germany. He was Program Committee Member of WCC,WCC,WCC,WCC, and WCC (Workshop on Coding theory and Cryptography). He has been the advisor of about Ph.D. and M.Sc. students in the area of coding theory and cryptography. Dr. van Tilborg has written three books, two on cryptology and one on coding theory. He is the (co-)author of more than articles in leading journals and also holds two patents. He is the Associate editor of Designs, Codes and Cryptography and Journal of Combinatorics, Information & System Sciences. From April –December he was the Associate editor for the Journal of the Indonesian Mathematical Society. He is also the Advisory editor of Advances in Mathematics of Communications since January and editor of the Asian-European Journal of Mathematics.Sushil Jajodia is University Professor, BDM International Professor of Information Technology, and the director of Center for Secure Information Systems at the George Mason University, Fairfax, Virginia. He served as the chair of the Department of Information and Software Engineering during -0.He joined GMU after serving as the director of the Database and Expert Systems Program within the Division of Information, Robotics, and Intelligent Systems at the National Science Foundation. Before that he was the head of the Database and Distributed Systems Section in the Computer Science and Systems Branch at the Naval Research Laboratory, Washington and Associate Professor of Computer Science and Director of Graduate Studies at the University of Missouri, Columbia. He has also been a visiting professor at the University ofMilan and University of Rome “La Sapienza”, Italy and at the Isaac Newton Institute forMathematical Sciences, Cambridge University, England. Dr. Jajodia received his Ph.D. from the University of Oregon, Eugene. The scope of his current research interests encompasses information secrecy, privacy, integrity, and availability problems in military, civil, and commercial sectors. He has authored six books, edited thirty four books and conference proceedings, and published more than technical papers in the refereed journals and conference proceedings. He is also a holder of eight patents and has several patent applications pending.He received the Kristian Beckman award fromIFIP TC for his contributions to the discipline of Information Security, Outstanding Research Faculty Award from Mason’s Volgenau School of Engineering, and ACM SIGSAC Outstanding Contributions Award for his research and teaching contributions to the information security field and his service to ACM SIGSAC and the computing community. He was recognized for the most accepted papers at the th anniversary of the IEEE Symposium on Security and Privacy. His h-index is. Dr. Jajodia has served in different capacities for various journals and conferences. He serves on the editorial boards of IET Information Security, International Journal of Cooperative Information Systems, International Journal of Information and Computer Security, and International Journal of Information Security and Privacy. He was the founding editor-in-chief of the Journal of Computer Security (–) and a past editor of ACM Transactions on Information and Systems Security (–) and IEEE Transactions on Knowledge and Data Engineering. He is the consulting editor of the Springer International Series on Advances in Information Security. He has been named a Golden Core member for his service to the IEEE Computer Society, and received International Federation for Information Processing (IFIP) Silver Core Award “in recognition of outstanding services to IFIP” in.He is a past chair of the ACM Special Interest Group on Security, Audit, and Control (SIGSAC), IEEE Computer Society Technical Committee on Data Engineering, and IFIPWG. on Systems Integrity and Control. He is a seniormember of the IEEE and a member of IEEE Computer Society and Association for Computing Machinery.

Over 750 entries, in A-Z format.

Erscheint lt. Verlag 8.7.2014
Reihe/Serie Encyclopedia of Cryptography and Security
Verlagsort Boston
Sprache englisch
Themenwelt Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
ISBN-10 1-4419-5906-8 / 1441959068
ISBN-13 978-1-4419-5906-5 / 9781441959065
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Build memory-efficient cross-platform applications using .NET Core

von Trevoir Williams

eBook Download (2024)
Packt Publishing (Verlag)
29,99
Learn asynchronous programming by building working examples of …

von Carl Fredrik Samson

eBook Download (2024)
Packt Publishing Limited (Verlag)
29,99