Fundamentals of Computer Security / Edition 1

Fundamentals of Computer Security / Edition 1

by Josef Pieprzyk, Jennifer Seberry, Thomas Hardjono
     
 

View All Available Formats & Editions

ISBN-10: 3540431012

ISBN-13: 9783540431015

Pub. Date: 03/10/2003

Publisher: Springer Berlin Heidelberg

The book studies modern concepts of Computer Security. It is selfcontained in the sense that it introduces the basic mathematical background necessary to follow computer security concepts. Next we examine modern developments in Cryptography starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing,

Overview

The book studies modern concepts of Computer Security. It is selfcontained in the sense that it introduces the basic mathematical background necessary to follow computer security concepts. Next we examine modern developments in Cryptography starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, identification and finishing with an introduction to modern e-business systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.

Product Details

ISBN-13:
9783540431015
Publisher:
Springer Berlin Heidelberg
Publication date:
03/10/2003
Series:
Monographs in Theoretical Computer Science
Edition description:
2003
Pages:
677
Product dimensions:
10.00(w) x 7.00(h) x 1.56(d)

Table of Contents

1. Introduction.- 2. Background Theory.- 3. Private-Key Cryptosystems.- 4. Public-Key Cryptosystems.- 5. Pseudorandomness.- 6. Hashing.- 7. Digital Signatures.- 8. Authentication.- 9. Secret Sharing.- 10. Group-oriented Cryptography.- 11. Key Establishment Protocols.- 12. Zero Knowledge Proof Systems.- 13. Identification.- 14. Intrusion Detection.- 15. Electronic Elections and Digital Money.- 16. Database Protection and Security.- 17. Access Control.- 18. Network Security.- Bibliography.


Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >