Marknadens största urval
Snabb leverans

Böcker i Chapman & Hall/CRC Cryptography and Network Security Series-serien

Filter
Filter
Sortera efterSortera Serieföljd
  • av Douglas R. (University of Waterloo Stinson
    1 340,-

    This text presents the main techniques of algorithm design, namely, divide-and-conquer algorithms, greedy algorithms, dynamic programming algorithms, and backtracking. Graph algorithms are studied in detail, and a careful treatment of the theory of NP-completeness is presented.

  • - The Story of Cryptology
    av Craig (York College of Pennsylvania Bauer
    1 216,-

    This unique, award winning book offers a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical perparation, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author¿a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History¿includes interesting instances of codes and ciphers in crime, literature, music, and art. The book helps further enlivens the already extremely popular field of cryptology.

  • - Third Edition
    av College Park, Ramat Gan, USA) Katz, m.fl.
    1 610,-

  •  
    2 266,-

    Mathematicians have skills that would enable them to use data to answer questions important to them and others, and report those answers in compelling ways. Data science combines parts of mathematics, statistics, computer science. This handbook will assist mathematicians to better understand the opportunities presented by data science.

  • av Craig (York College of Pennsylvania Bauer
    2 090,-

  •  
    1 310,-

    This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes.

  • av Lidong Chen
    2 590,-

    Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience.

  • av Maria Isabel (Universidad Rey Juan Carlos Gonzalez Vasco
    1 580,-

    Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic constructions. This title focuses on the specifics of using nonabelian groups in the field of cryptography. It provides an introduction to cryptography with emphasis on group theoretic constructions.

  • - A Logical Approach
    av Shiu-Kai Chin
    1 676,-

    Using propositional modal logic to explain access control principles, this work provides the mathematical means to comprehend, analyze, create and verify the policies and control mechanisms used to protect resources. It is suitable for those designing, implementing and verifying computer and information systems.

  •  
    2 190,-

    Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. This book applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more.

  • av Antoine (Universite de Versailles Sain-Quentin-en-Yvelines Joux
    1 976,-

    Illustrating the power of algorithms, this book describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.

  • av M. Jason Hinek
    1 600,-

    Focusing on mathematical attacks that exploit the structure of RSA and specific parameter choices, this book provides a collection of well-known attacks on RSA and its main variants, including CRT-RSA, multi-prime RSA, and multi-power RSA. It treats the cryptanalysis of the main variants of RSA as a major topic.

  • av Douglas Jacobson
    1 500,-

    Discusses network architecture, the functions of layers in a typical network, and network based attacks including header, protocol, and authentication attacks. This book provides an understanding of the vulnerabilities and mechanisms of each layer of network security. It also presents homework problems, laboratory experiments, and appendices.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.