Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Modern Cryptography: Applied Mathematics for Encryption and Information Security, Easttom William


Варианты приобретения
Цена: 51230.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 151 шт.  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Easttom William
Название:  Modern Cryptography: Applied Mathematics for Encryption and Information Security
ISBN: 9783030631178
Издательство: Springer
Классификация:







ISBN-10: 3030631176
Обложка/Формат: Paperback
Страницы: 412
Вес: 0.58 кг.
Дата издания: 20.12.2021
Язык: English
Издание: 1st ed. 2021
Иллюстрации: 200 tables, color; 85 illustrations, color; 76 illustrations, black and white; xix, 390 p. 161 illus., 85 illus. in color.; 200 tables, color; 85 illu
Размер: 23.39 x 15.60 x 2.13 cm
Читательская аудитория: Professional & vocational
Подзаголовок: Applied mathematics for encryption and information security
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание:

Chapter 1. History of Cryptography to the 1800s.- Chapter 2. History of Cryptography from the 1800s.- Chapter 3. Basic Information Theory.- Chapter 4. Essential Number Theory and Discrete Math.- Chapter 5. Essential Algebra.- Chapter 6. Fiestel Networks.- Chapter 7. Substitution-Permutation Networks.- Chapter 8. S-Box Design.- Chapter 9. Cryptographic Hashes.- Chapter 10. Asymmetric Algorithms.- Chapter 11. Elliptic Curve Cryptography.- Chapter 12. Random Number Generators.- Chapter 13.SSL/TLS.- Chapter 14. Virtual Private networks, Authentication, And Wireless Security.- Chapter 15. Military Applications.- Chapter 16. Steganography.- Chapter 17. Cryptanalysis.- Chapter 18. Cryptographic Backdoors.- Chapter 19. Quantum Computing and Cryptography.



Information Hiding in Communication Networks

Автор: Mazurczyk Wojciech
Название: Information Hiding in Communication Networks
ISBN: 1118861698 ISBN-13(EAN): 9781118861691
Издательство: Wiley
Рейтинг:
Цена: 91820.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications.

Multimedia Encryption and Authentication Techniques and Applications

Автор: Furht, Borko , Kirovski, Darko
Название: Multimedia Encryption and Authentication Techniques and Applications
ISBN: 0367453630 ISBN-13(EAN): 9780367453633
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Providing a comprehensive reference on advanced topics in the field, this book addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection. It presents state-of-the-art multimedia security technologies such as protection architectures, multimedia encryption, watermarking, fingerprin

Protecting Privacy Through Homomorphic Encryption

Автор: Lauter Kristin, Dai Wei, Laine Kim
Название: Protecting Privacy Through Homomorphic Encryption
ISBN: 3030772861 ISBN-13(EAN): 9783030772864
Издательство: Springer
Рейтинг:
Цена: 102480.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption.

Computational Number Theory and Modern Cryptography

Автор: Yan Song Y
Название: Computational Number Theory and Modern Cryptography
ISBN: 1118188586 ISBN-13(EAN): 9781118188583
Издательство: Wiley
Рейтинг:
Цена: 87590.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: * Makes deep mathematical problems accessible to computer scientists and engineers * Based on classroom tested materials used in the US, UK and China * Exercises included in every chapter * Instructor resources available on the book s Companion Website .

Implementing Computational Intelligence Techniques for Security Systems Design

Автор: Yousif Abdullatif Albastaki, Wasan Awad
Название: Implementing Computational Intelligence Techniques for Security Systems Design
ISBN: 1799824187 ISBN-13(EAN): 9781799824183
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 174630.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues.

Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Implementing Computational Intelligence Techniques for Security Systems Design

Автор: Yousif Abdullatif Albastaki, Wasan Awad
Название: Implementing Computational Intelligence Techniques for Security Systems Design
ISBN: 1799824195 ISBN-13(EAN): 9781799824190
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 134910.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues.

Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Verifiable Composition of Signature and Encryption: A Comprehensive Study of the Design Paradigms

Автор: El Aimani Laila
Название: Verifiable Composition of Signature and Encryption: A Comprehensive Study of the Design Paradigms
ISBN: 3319885510 ISBN-13(EAN): 9783319885513
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Part I: Background.- 1. Preliminaries.- 2. Case-study primitives.- Part II: the "Sign then Encrypt" (StE) paradigm.- 3. Analysis of StE.- 4. An efficient variant of StE.- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm.- 5. Analysis of CtEaS.- 6. CtEtS: an efficient variant of CtEaS.- Part IV: New paradigms.- 7. EtStE: a new paradigm for verifiable signcryption.- 8. Multi-user security.- 9. Insider privacy.-10. Wrap - up.

Color Image Watermarking: Algorithms and Technologies

Автор: Qingtang Su
Название: Color Image Watermarking: Algorithms and Technologies
ISBN: 3110487578 ISBN-13(EAN): 9783110487572
Издательство: Walter de Gruyter
Рейтинг:
Цена: 123910.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.

Identity-Based Encryption

Автор: Sanjit Chatterjee; Palash Sarkar
Название: Identity-Based Encryption
ISBN: 1489996974 ISBN-13(EAN): 9781489996978
Издательство: Springer
Рейтинг:
Цена: 107130.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.

Fast Software Encryption

Автор: Lars Knudsen
Название: Fast Software Encryption
ISBN: 354066226X ISBN-13(EAN): 9783540662266
Издательство: Springer
Рейтинг:
Цена: 65210.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume covers the 6th International Workshop on Fast Software Encryption, held in Rome, Italy, in March 1999. It is divided into sections on advanced encryption standard (AES), remotely keyed encryptions, analysis of block ciphers, miscellaneous, modes of operation and stream ciphers.

Verifiable Composition of Signature and Encryption

Автор: Laila El Aimani
Название: Verifiable Composition of Signature and Encryption
ISBN: 3319681117 ISBN-13(EAN): 9783319681115
Издательство: Springer
Рейтинг:
Цена: 102480.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Part I: Background.- 1. Preliminaries.- 2. Case-study primitives.- Part II: the "Sign then Encrypt" (StE) paradigm.- 3. Analysis of StE.- 4. An efficient variant of StE.- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm.- 5. Analysis of CtEaS.- 6. CtEtS: an efficient variant of CtEaS.- Part IV: New paradigms.- 7. EtStE: a new paradigm for verifiable signcryption.- 8. Multi-user security.- 9. Insider privacy.-10. Wrap - up.

Fast Software Encryption

Автор: Kaisa Nyberg
Название: Fast Software Encryption
ISBN: 3540710388 ISBN-13(EAN): 9783540710387
Издательство: Springer
Рейтинг:
Цена: 83850.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne, Switzerland in February 2008. This work includes papers that address various aspects of fast and secure primitives for symmetric cryptology and are organized in topical sections on SHA collisions, security bounds, and entropy.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия