Tous les ebooks de la collection "Information Security and Cryptography" - Springer


10  résultat(s)
Télécharger le livre :  Fault-Tolerant Distributed Consensus in Synchronous Networks
Ajouter à ma liste d'envies

Fault-Tolerant Distributed Consensus in Synchronous Networks


Ashish Choudhury , Arpita Patra


Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the problem by Lamport et al in 1982, the problem has been widely studied, both in cryptography as well as distributed...

Parution : 2025-03-24
Format(s) : PDF
Éditeur : Springer
J'achète
116,04
Télécharger le livre :  The Complete Guide to SCION
Ajouter à ma liste d'envies

The Complete Guide to SCION


Collectif


When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this...

Parution : 2022-05-16
Format(s) : PDF
Éditeur : Springer
J'achète
94,94
Télécharger le livre :  Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
Ajouter à ma liste d'envies

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity


Yan Lin


There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard...

Parution : 2021-04-30
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
94,94
Télécharger le livre :  The Design of Rijndael
Ajouter à ma liste d'envies

The Design of Rijndael


Joan Daemen , Vincent Rijmen


This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology.The authors developed the Rijndael algorithm...

Parution : 2020-05-23
Format(s) : PDF
Éditeur : Springer
J'achète
168,79
Télécharger le livre :  Modelling and Verification of Secure Exams
Ajouter à ma liste d'envies

Modelling and Verification of Secure Exams


Rosario Giustolisi


In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management...

Parution : 2018-03-19
Format(s) : PDF
Éditeur : Springer
J'achète
52,74
Télécharger le livre :  Secure Data Deletion
Ajouter à ma liste d'envies

Secure Data Deletion


Joel Reardon


This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage...

Parution : 2016-11-02
Format(s) : PDF
Éditeur : Springer
J'achète
126,59
Télécharger le livre :  Practical Signcryption
Ajouter à ma liste d'envies

Practical Signcryption


Alexander W. Dent , Yuliang Zheng


In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not...

Parution : 2010-11-11
Format(s) : ePub
Éditeur : Springer
J'achète
94,94
Télécharger le livre :  Towards Hardware-Intrinsic Security
Ajouter à ma liste d'envies

Towards Hardware-Intrinsic Security


David Naccache , Ahmad-Reza Sadeghi


Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required...

Parution : 2010-11-03
Format(s) : ePub
Éditeur : Springer
J'achète
147,69
Télécharger le livre :  Efficient Secure Two-Party Protocols
Ajouter à ma liste d'envies

Efficient Secure Two-Party Protocols


Carmit Hazay , Yehuda Lindell


In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and...

Parution : 2010-11-02
Format(s) : PDF
Éditeur : Springer
J'achète
168,79
Ajouter à ma liste d'envies

Concurrent Zero-Knowledge


Alon Rosen


Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze- knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their...

Parution : 2007-05-16
Format(s) : PDF
Éditeur : Springer
J'achète
94,94

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés