Cargando…

Cryptography : protocols, design, and applications /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Lek, Kamol, Rajapakse, Naruemol
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hauppauge, N.Y. : Nova Science Publishers, [2012]
Colección:Cryptography, Steganography and Data Security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_ocn831676496
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 111004s2012 nyua o 001 0 eng
010 |a  2019721371 
040 |a DLC  |b eng  |e rda  |c DLC  |d YDXCP  |d E7B  |d OCLCF  |d EBLCP  |d DEBSZ  |d AZK  |d MERUC  |d AGLDB  |d Z5A  |d ZCU  |d U3W  |d STF  |d WRM  |d VTS  |d ICG  |d INT  |d VT2  |d AU@  |d WYU  |d DKC  |d UKCRE  |d N$T  |d OCLCO  |d AJS  |d OCLCO  |d OCLCQ  |d QGK 
019 |a 961565933  |a 962704985  |a 988450866  |a 991988774  |a 1037926005  |a 1038675395  |a 1045485098  |a 1055338544  |a 1058061972  |a 1065922252  |a 1081291321  |a 1153455854  |a 1259127326 
020 |a 9781621008316  |q pdf 
020 |a 1621008312 
020 |z 9781621007791  |q hardcover 
020 |z 1621007790 
029 1 |a NZ1  |b 15492755 
029 1 |a NZ1  |b 15023284 
029 1 |a DEBSZ  |b 472776908 
029 1 |a DEBSZ  |b 456603239 
029 1 |a DEBBG  |b BV044089214 
029 1 |a DEBBG  |b BV043775231 
029 1 |a CHNEW  |b 000615071 
029 1 |a AU@  |b 000053305731 
035 |a (OCoLC)831676496  |z (OCoLC)961565933  |z (OCoLC)962704985  |z (OCoLC)988450866  |z (OCoLC)991988774  |z (OCoLC)1037926005  |z (OCoLC)1038675395  |z (OCoLC)1045485098  |z (OCoLC)1055338544  |z (OCoLC)1058061972  |z (OCoLC)1065922252  |z (OCoLC)1081291321  |z (OCoLC)1153455854  |z (OCoLC)1259127326 
050 0 0 |a QA76.9.A25 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 0 |a 005.8/2  |2 23 
049 |a UAMI 
245 0 0 |a Cryptography :  |b protocols, design, and applications /  |c Kamol Lek and Naruemol Rajapakse, editors. 
264 1 |a Hauppauge, N.Y. :  |b Nova Science Publishers,  |c [2012] 
264 4 |c Ã2012 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cryptography, steganography and data security 
490 1 |a Privacy and identity protection 
504 |a Includes bibliographic references and index. 
588 |a Description based on print version record. 
505 0 |a CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY; Abstract; 1. Introduction; 1.1. Historical Background; 1.2. Quantum Information Theory; 1.3. Emerging Quantum Influences ; 2. Private Communication on the Quantum Channel; 2.1. The Private Quantum Channel; 2.2. The Private Capacity of a Quantum Channel; 2.3. The Non-additivity of Private Information; 3. Quantum Bit Commitment. 
505 8 |a 3.1. History of Quantum Bit Commitment3.2. Description of Quantum Bit Commitment; 3.3. Security of the Bit Commitment Protocol; 4. Quantum Oblivious Transfer; 4.1. History of Quantum Oblivious Transfer; 5. Quantum Fingerprinting; 5.1. History of Quantum Fingerprinting; 5.2. Description of Quantum Fingerprinting; 6. Quantum Digital Signatures; 6.1. History of Quantum Digital Signatures; 6.2. Description of Quantum Digital Signatures; 7. Quantum Authentication; 7.1. Description of Quantum Authentication; 8. Uncloneable Quantum Encryption and QuantumAuthentication. 
505 8 |a 8.1. Description of Uncloneable Quantum Encryption8.2. Security of the Uncloneable Quantum Encryption Scheme; 9. Quantum Secret Sharing; 9.1. Description of Quantum Secret Sharing; 9.2. Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. The Quantum Public Key Scheme; 10.1. History of Quantum Public Key Scheme; 10.2. Description of Quantum Public Key Scheme; 10.3. Security of the Quantum Public Key Protocol; 10.4. Eve's Attack on the Quantum Public Key Method; 10.5. Behind the Security of the Quantum Public Key Protocol. 
505 8 |a 11. Quantum Money11.1. History of Quantum Money; 11.2. Description of Quantum Money; 11.3. New Models of Quantum Money; 12. Conclusions; 13. Further Reading; Author Biographies; References; Chapter 2: LOW-COST MUTUAL AUTHENTICATION PROTOCOLS; Introduction; Lightweight Mutual Authentication Protocols; The Karthikeyan and Nesterenko Protocol; The Duc et al. Protocol; The Chien and Chen Protocol; The Li et al. Protocol; The Chien and Huang Protocol; The Chen and Deng Protocol; The Qingling et al. Protocol; The Sun and Ting Protocol; Ultralightweight Mutual Authentication Protocols. 
505 8 |a The M2AP, EMAP, and LMAP ProtocolsThe Strong Authentication and Strong Integrity (SASI) Protocol; The Gossamer Protocol; Associated Protocols; Summary; References; Chapter 3: A HIGHLY EFFICIENT VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES; Abstract; 1. Introduction; 2. Related Works; 2.1. (2, 2) VSSM Schemes; 2.2. (k, n)-m-VSSM Schemes; 3. Encryption Algorithm; 3.1. (2, 2)-2-VSSM Schemes; 3.2. Refine the Recovered Images; 4. Implementation Results and Security Analysis; 4.1. Performance Evaluations; 4.2. Security Analysis; 4.3. Comparison with Previous Approach; 5. Conclusion; References. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Cryptographie. 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
700 1 |a Lek, Kamol. 
700 1 |a Rajapakse, Naruemol. 
776 0 8 |i Print version:  |t Cryptography  |z 9781621007791 (hardcover)  |w (DLC) 2011038358 
830 0 |a Cryptography, Steganography and Data Security. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=541860  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 7136855 
938 |a EBSCOhost  |b EBSC  |n 541860 
938 |a ebrary  |b EBRY  |n ebr10683052 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL3021394 
994 |a 92  |b IZTAP