語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Encyclopedia of cryptography, securi...
~
Jajodia, Sushil.
FindBook
Google Book
Amazon
博客來
Encyclopedia of cryptography, security and privacy
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Encyclopedia of cryptography, security and privacy/ edited by Sushil Jajodia, Pierangela Samarati, Moti Yung.
其他作者:
Jajodia, Sushil.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
lxi, 2817 p. :ill. (some col.), digital ;24 cm.
內容註:
Security Policies and Access Control -- Public key encryption, digital signatures -- Number theory, primality tests, discrete log, factorisation -- Public-key cryptography, hardware, physical attacks -- Implementation aspects of cryptographic algorithms -- Hardware attacks -- Multi-party computation, voting schemes, digital signature schemes -- Web security -- DBMS and Application Security -- Biometrics -- Software Security -- Network Security -- Formal Methods and Assurance -- Sensor and Ad Hoc Networks -- DOS -- Privacy-preserving data mining -- Private information retrieval -- Privacy metrics and data protection -- Wireless Security -- Broadcast channel, secret sharing, threshold schemes, subliminal channels -- Risk management and organizational security and privacy -- Usable/user-centric privacy -- Less-constrained biometrics -- Access and Query Privacy -- Cryptocurrencies -- Encryption-Based Access Control Based on Public Key Cryptography -- Cyber-physical systems and infrastructure: security andprivacy -- Location privacy and privacy in locations-based applications -- Privacy in emerging scenarios -- Privacy and security in social networks -- Economics of security and privacy -- Key management -- Elliptic curve cryptography -- Sequences, Boolean functions, stream ciphers -- Secure multiparty computations -- Human Aspects in Security and Privacy -- Trustworthy Computing, Physical/Hardware Security -- AI approaches for security and privacy -- Privacy and anonymity in communication networks -- Privacy laws and directives.
Contained By:
Springer Nature eReference
標題:
Cryptography - Encyclopedias. -
電子資源:
https://doi.org/10.1007/978-3-030-71522-9
ISBN:
9783030715229
Encyclopedia of cryptography, security and privacy
Encyclopedia of cryptography, security and privacy
[electronic resource] /edited by Sushil Jajodia, Pierangela Samarati, Moti Yung. - Third edition. - Cham :Springer Nature Switzerland :2025. - lxi, 2817 p. :ill. (some col.), digital ;24 cm.
Security Policies and Access Control -- Public key encryption, digital signatures -- Number theory, primality tests, discrete log, factorisation -- Public-key cryptography, hardware, physical attacks -- Implementation aspects of cryptographic algorithms -- Hardware attacks -- Multi-party computation, voting schemes, digital signature schemes -- Web security -- DBMS and Application Security -- Biometrics -- Software Security -- Network Security -- Formal Methods and Assurance -- Sensor and Ad Hoc Networks -- DOS -- Privacy-preserving data mining -- Private information retrieval -- Privacy metrics and data protection -- Wireless Security -- Broadcast channel, secret sharing, threshold schemes, subliminal channels -- Risk management and organizational security and privacy -- Usable/user-centric privacy -- Less-constrained biometrics -- Access and Query Privacy -- Cryptocurrencies -- Encryption-Based Access Control Based on Public Key Cryptography -- Cyber-physical systems and infrastructure: security andprivacy -- Location privacy and privacy in locations-based applications -- Privacy in emerging scenarios -- Privacy and security in social networks -- Economics of security and privacy -- Key management -- Elliptic curve cryptography -- Sequences, Boolean functions, stream ciphers -- Secure multiparty computations -- Human Aspects in Security and Privacy -- Trustworthy Computing, Physical/Hardware Security -- AI approaches for security and privacy -- Privacy and anonymity in communication networks -- Privacy laws and directives.
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas. The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.
ISBN: 9783030715229
Standard No.: 10.1007/978-3-030-71522-9doiSubjects--Topical Terms:
895926
Cryptography
--Encyclopedias.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Encyclopedia of cryptography, security and privacy
LDR
:04098nmm a2200373 a 4500
001
2408496
003
DE-He213
005
20250111115247.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783030715229
$q
(electronic bk.)
020
$a
9783030715205
$q
(paper)
024
7
$a
10.1007/978-3-030-71522-9
$2
doi
035
$a
978-3-030-71522-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UMB
$2
bicssc
072
7
$a
GPF
$2
bicssc
072
7
$a
COM021000
$2
bisacsh
072
7
$a
UMB
$2
thema
072
7
$a
GPF
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
E56 2025
245
0 0
$a
Encyclopedia of cryptography, security and privacy
$h
[electronic resource] /
$c
edited by Sushil Jajodia, Pierangela Samarati, Moti Yung.
250
$a
Third edition.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
lxi, 2817 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Security Policies and Access Control -- Public key encryption, digital signatures -- Number theory, primality tests, discrete log, factorisation -- Public-key cryptography, hardware, physical attacks -- Implementation aspects of cryptographic algorithms -- Hardware attacks -- Multi-party computation, voting schemes, digital signature schemes -- Web security -- DBMS and Application Security -- Biometrics -- Software Security -- Network Security -- Formal Methods and Assurance -- Sensor and Ad Hoc Networks -- DOS -- Privacy-preserving data mining -- Private information retrieval -- Privacy metrics and data protection -- Wireless Security -- Broadcast channel, secret sharing, threshold schemes, subliminal channels -- Risk management and organizational security and privacy -- Usable/user-centric privacy -- Less-constrained biometrics -- Access and Query Privacy -- Cryptocurrencies -- Encryption-Based Access Control Based on Public Key Cryptography -- Cyber-physical systems and infrastructure: security andprivacy -- Location privacy and privacy in locations-based applications -- Privacy in emerging scenarios -- Privacy and security in social networks -- Economics of security and privacy -- Key management -- Elliptic curve cryptography -- Sequences, Boolean functions, stream ciphers -- Secure multiparty computations -- Human Aspects in Security and Privacy -- Trustworthy Computing, Physical/Hardware Security -- AI approaches for security and privacy -- Privacy and anonymity in communication networks -- Privacy laws and directives.
520
$a
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas. The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.
650
0
$a
Cryptography
$v
Encyclopedias.
$3
895926
650
0
$a
Computer security
$v
Encyclopedias.
$3
3781013
650
1 4
$a
Data Structures and Information Theory.
$3
3382368
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Coding and Information Theory.
$3
891252
700
1
$a
Jajodia, Sushil.
$3
745398
700
1
$a
Samarati, Pierangela.
$3
833129
700
1
$a
Yung, Moti.
$3
840234
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eReference
856
4 0
$u
https://doi.org/10.1007/978-3-030-71522-9
950
$a
Computer Science (SpringerNature-11645)
950
$a
Reference Module Computer Science and Engineering (SpringerNature-43748)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9513994
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入