|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn831676496 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
111004s2012 nyua o 001 0 eng |
010 |
|
|
|a 2019721371
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d YDXCP
|d E7B
|d OCLCF
|d EBLCP
|d DEBSZ
|d AZK
|d MERUC
|d AGLDB
|d Z5A
|d ZCU
|d U3W
|d STF
|d WRM
|d VTS
|d ICG
|d INT
|d VT2
|d AU@
|d WYU
|d DKC
|d UKCRE
|d N$T
|d OCLCO
|d AJS
|d OCLCO
|d OCLCQ
|d QGK
|
019 |
|
|
|a 961565933
|a 962704985
|a 988450866
|a 991988774
|a 1037926005
|a 1038675395
|a 1045485098
|a 1055338544
|a 1058061972
|a 1065922252
|a 1081291321
|a 1153455854
|a 1259127326
|
020 |
|
|
|a 9781621008316
|q pdf
|
020 |
|
|
|a 1621008312
|
020 |
|
|
|z 9781621007791
|q hardcover
|
020 |
|
|
|z 1621007790
|
029 |
1 |
|
|a NZ1
|b 15492755
|
029 |
1 |
|
|a NZ1
|b 15023284
|
029 |
1 |
|
|a DEBSZ
|b 472776908
|
029 |
1 |
|
|a DEBSZ
|b 456603239
|
029 |
1 |
|
|a DEBBG
|b BV044089214
|
029 |
1 |
|
|a DEBBG
|b BV043775231
|
029 |
1 |
|
|a CHNEW
|b 000615071
|
029 |
1 |
|
|a AU@
|b 000053305731
|
035 |
|
|
|a (OCoLC)831676496
|z (OCoLC)961565933
|z (OCoLC)962704985
|z (OCoLC)988450866
|z (OCoLC)991988774
|z (OCoLC)1037926005
|z (OCoLC)1038675395
|z (OCoLC)1045485098
|z (OCoLC)1055338544
|z (OCoLC)1058061972
|z (OCoLC)1065922252
|z (OCoLC)1081291321
|z (OCoLC)1153455854
|z (OCoLC)1259127326
|
050 |
0 |
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 083000
|2 bisacsh
|
082 |
0 |
0 |
|a 005.8/2
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cryptography :
|b protocols, design, and applications /
|c Kamol Lek and Naruemol Rajapakse, editors.
|
264 |
|
1 |
|a Hauppauge, N.Y. :
|b Nova Science Publishers,
|c [2012]
|
264 |
|
4 |
|c Ã2012
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cryptography, steganography and data security
|
490 |
1 |
|
|a Privacy and identity protection
|
504 |
|
|
|a Includes bibliographic references and index.
|
588 |
|
|
|a Description based on print version record.
|
505 |
0 |
|
|a CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY; Abstract; 1. Introduction; 1.1. Historical Background; 1.2. Quantum Information Theory; 1.3. Emerging Quantum Influences ; 2. Private Communication on the Quantum Channel; 2.1. The Private Quantum Channel; 2.2. The Private Capacity of a Quantum Channel; 2.3. The Non-additivity of Private Information; 3. Quantum Bit Commitment.
|
505 |
8 |
|
|a 3.1. History of Quantum Bit Commitment3.2. Description of Quantum Bit Commitment; 3.3. Security of the Bit Commitment Protocol; 4. Quantum Oblivious Transfer; 4.1. History of Quantum Oblivious Transfer; 5. Quantum Fingerprinting; 5.1. History of Quantum Fingerprinting; 5.2. Description of Quantum Fingerprinting; 6. Quantum Digital Signatures; 6.1. History of Quantum Digital Signatures; 6.2. Description of Quantum Digital Signatures; 7. Quantum Authentication; 7.1. Description of Quantum Authentication; 8. Uncloneable Quantum Encryption and QuantumAuthentication.
|
505 |
8 |
|
|a 8.1. Description of Uncloneable Quantum Encryption8.2. Security of the Uncloneable Quantum Encryption Scheme; 9. Quantum Secret Sharing; 9.1. Description of Quantum Secret Sharing; 9.2. Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. The Quantum Public Key Scheme; 10.1. History of Quantum Public Key Scheme; 10.2. Description of Quantum Public Key Scheme; 10.3. Security of the Quantum Public Key Protocol; 10.4. Eve's Attack on the Quantum Public Key Method; 10.5. Behind the Security of the Quantum Public Key Protocol.
|
505 |
8 |
|
|a 11. Quantum Money11.1. History of Quantum Money; 11.2. Description of Quantum Money; 11.3. New Models of Quantum Money; 12. Conclusions; 13. Further Reading; Author Biographies; References; Chapter 2: LOW-COST MUTUAL AUTHENTICATION PROTOCOLS; Introduction; Lightweight Mutual Authentication Protocols; The Karthikeyan and Nesterenko Protocol; The Duc et al. Protocol; The Chien and Chen Protocol; The Li et al. Protocol; The Chien and Huang Protocol; The Chen and Deng Protocol; The Qingling et al. Protocol; The Sun and Ting Protocol; Ultralightweight Mutual Authentication Protocols.
|
505 |
8 |
|
|a The M2AP, EMAP, and LMAP ProtocolsThe Strong Authentication and Strong Integrity (SASI) Protocol; The Gossamer Protocol; Associated Protocols; Summary; References; Chapter 3: A HIGHLY EFFICIENT VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES; Abstract; 1. Introduction; 2. Related Works; 2.1. (2, 2) VSSM Schemes; 2.2. (k, n)-m-VSSM Schemes; 3. Encryption Algorithm; 3.1. (2, 2)-2-VSSM Schemes; 3.2. Refine the Recovered Images; 4. Implementation Results and Security Analysis; 4.1. Performance Evaluations; 4.2. Security Analysis; 4.3. Comparison with Previous Approach; 5. Conclusion; References.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Cryptography.
|2 bisacsh
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
700 |
1 |
|
|a Lek, Kamol.
|
700 |
1 |
|
|a Rajapakse, Naruemol.
|
776 |
0 |
8 |
|i Print version:
|t Cryptography
|z 9781621007791 (hardcover)
|w (DLC) 2011038358
|
830 |
|
0 |
|a Cryptography, Steganography and Data Security.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=541860
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7136855
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 541860
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10683052
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3021394
|
994 |
|
|
|a 92
|b IZTAP
|