Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

An Introduction to Cryptography, Mollin, Richard A.


Варианты приобретения
Цена: 16078.00р.
Кол-во:
 о цене
Наличие: Отсутствует. 
Возможна поставка под заказ. Дата поступления на склад уточняется после оформления заказа


Добавить в корзину
в Мои желания

Автор: Mollin, Richard A.
Название:  An Introduction to Cryptography
ISBN: 9781584886181
Издательство: Taylor&Francis
Классификация:
ISBN-10: 1584886188
Обложка/Формат: Hardback
Страницы: 413
Вес: 0.76 кг.
Дата издания: 18.09.2006
Серия: Discrete mathematics and its applications
Язык: English
Издание: 2 ed
Иллюстрации: 41 illustrations, black and white
Размер: 227 x 152 x 30
Читательская аудитория: Undergraduate
Рейтинг:
Поставляется из: Европейский союз


Introduction to Mathematical Cryptography

Автор: Jeffrey Hoffstein and Jill Pipher
Название: Introduction to Mathematical Cryptography
ISBN: 1493917102 ISBN-13(EAN): 9781493917105
Издательство: Springer
Рейтинг:
Цена: 10976.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: An Introduction to Mathematical Cryptography

An Introduction to Secret Sharing

Автор: Stephen Krenn, Thomas Lorunser
Название: An Introduction to Secret Sharing
ISBN: 3031281608 ISBN-13(EAN): 9783031281600
Издательство: Springer
Рейтинг:
Цена: 5487.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.

Modern Cryptography: Applied Mathematics for Encryption and Information Security

Автор: William Easttom
Название: Modern Cryptography: Applied Mathematics for Encryption and Information Security
ISBN: 3031123034 ISBN-13(EAN): 9783031123030
Издательство: Springer
Рейтинг:
Цена: 6707.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. * Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; * Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); * Includes a full suite of classroom materials including exercises, Q&A, and examples.

Modern Cryptography with Proof Techniques and Applications

Автор: Oun Hwang, Seong
Название: Modern Cryptography with Proof Techniques and Applications
ISBN: 1138584088 ISBN-13(EAN): 9781138584082
Издательство: Taylor&Francis
Рейтинг:
Цена: 18374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Proof techniques in cryptography are very difficult to understand even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proof of the cryptographic schemes, practical aspects of them have received comparatively less attention.

Financial Cryptography and Data Security: FC 2020 International Workshops, Asiausec, Codefi, Voting, and Wtsc, Kota Kinabalu, Malaysia, February 14, 2

Автор: Bernhard Matthew, Bracciali Andrea, Camp L. Jean
Название: Financial Cryptography and Data Security: FC 2020 International Workshops, Asiausec, Codefi, Voting, and Wtsc, Kota Kinabalu, Malaysia, February 14, 2
ISBN: 3030544540 ISBN-13(EAN): 9783030544546
Издательство: Springer
Рейтинг:
Цена: 13415.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea.- User-Centered Risk Communication for Safer Browsing.- The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails.- Cue Utilization, Phishing Feature and Phishing Email Detection.- Dis-Empowerment Online- An Investigation of Privacy & Sharing Perceptions & Method Preferences.- Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation.- Understanding Perceptions of Smart Devices.- In Our Employer We Trust: Mental Models of Office Worker's Privacy Perceptions.- Behaviour of Outsourced Employees as Sources of Information System Security Threats.- Exploring Effects of Auditory Stimuli on CAPTCHA Performance.- PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records.- Empathy as a Response to Frustration in Password Choice.- Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage.- Incorporating Psychology into Cyber Security Education: A Pedagogical Approach.- Effectiveness of multi-stakeholder discussions for decentralized finance: a conference report of CoDeFi 2020.- Multistakeholder Governance for the Internet.- Future of Finance: From G20 to practical implementation of multi-stakeholder governance on blockchain based finance.- Securing Cryptocurrency Exchange: Building up Standard from Huge Failures.- Origami voting: a non-cryptographic approach to transparent ballot verification.- Towards Improving the Efficacy of Code-Based Verification in Internet Voting.- Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme.- Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA.- A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections.- Vote selling resistant voting.- An Update on Marked Mix-Nets: An Attack, A Fix and PQ Possibilities.- Performance of Shuffling: Taking it to the Limits.- Characterizing Types of Smart Contracts in the Ethereum Landscape.- Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media.- Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts.- Scalable Open-Vote Network on Ethereum.- How to Dynamically Incentivize Sufficient Level of IoT Securitx.- Confidential and auditable payments.- MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network.- Marlowe: implementing and analysing financial contracts on blockchain.- Load Balancing for Sharded Blockchains.- The Extended UTXO Model.- Privacy-Preserving Cross-Chain Atomic Swaps.- A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods.- Enforcing Determinism of Java Smart Contracts.- Albert, an intermediate smart-contract language for the Tezos blockchain.- A Formally Verified Static Analysis Framework for Compositional Contracts.

Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms

Автор: Mihailescu Marius Iulian, Nita Stefania Loredana
Название: Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
ISBN: 1484265858 ISBN-13(EAN): 9781484265857
Издательство: Springer
Цена: 5103.00 р.
Наличие на складе: Нет в наличии.

Описание: Intermediate-Advanced user level

Blockchain for Business 2019

Автор: Lipovyanov Peter
Название: Blockchain for Business 2019
ISBN: 1789956021 ISBN-13(EAN): 9781789956023
Издательство: Неизвестно
Рейтинг:
Цена: 6435.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Blockchain has the potential to change the world and has become the hottest field in the tech sector now. Blockchain for Business is a comprehensive guide that enables you to fully understand the far-reaching applications beyond Bitcoin and empowers you to make fully-informed decisions.

The Design of Rijndael: The Advanced Encryption Standard (Aes)

Автор: Daemen Joan, Rijmen Vincent
Название: The Design of Rijndael: The Advanced Encryption Standard (Aes)
ISBN: 3662607689 ISBN-13(EAN): 9783662607688
Издательство: Springer
Рейтинг:
Цена: 19514.00 р.
Наличие на складе: Нет в наличии.

Описание: An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch.

Cryptography and network security /

Автор: Alencar, Marcelo S.,
Название: Cryptography and network security /
ISBN: 8770224072 ISBN-13(EAN): 9788770224079
Издательство: Taylor&Francis
Рейтинг:
Цена: 18374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: It comprises twelve chapters divided into two parts discussing "Non-neutral Evolution on Human Genes" (Part I) and "Evolution of Modern Human Populations" (Part II.)The most significant feature of this book is the continent-wise discussion of modern human dispersal using human genomic data in Part II.

Introduction to number theory with cryptography, second edition

Автор: Kraft, James (gilman School, Baltimore, Maryland, Usa) Washington, Lawrence
Название: Introduction to number theory with cryptography, second edition
ISBN: 1138063479 ISBN-13(EAN): 9781138063471
Издательство: Taylor&Francis
Рейтинг:
Цена: 8712.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular andimportant topic of cryptography, integrating it with traditional topics in number theory.

Cryptography: a very short introduction

Автор: Piper, Fred (director Of The Information Security Group And Professor Of Mathematics, Royal Holloway University Of London) Murphy, Sean (reader In Mat
Название: Cryptography: a very short introduction
ISBN: 0192803158 ISBN-13(EAN): 9780192803153
Издательство: Oxford Academ
Рейтинг:
Цена: 1590.00 р.
Наличие на складе: Поставка под заказ.

Описание: A clear and informative introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned.

Encrypt, sign, attack : a compact introduction to cryptography

Автор: Olaf Manz
Название: Encrypt, sign, attack : a compact introduction to cryptography
ISBN: 3662660148 ISBN-13(EAN): 9783662660140
Издательство: Springer
Рейтинг:
Цена: 4024.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия