Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Encyclopedia of cryptography, securi...
~
Jajodia, Sushil.
Linked to FindBook
Google Book
Amazon
博客來
Encyclopedia of cryptography, security and privacy
Record Type:
Electronic resources : Monograph/item
Title/Author:
Encyclopedia of cryptography, security and privacy/ edited by Sushil Jajodia, Pierangela Samarati, Moti Yung.
other author:
Jajodia, Sushil.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
lxi, 2817 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Security Policies and Access Control -- Public key encryption, digital signatures -- Number theory, primality tests, discrete log, factorisation -- Public-key cryptography, hardware, physical attacks -- Implementation aspects of cryptographic algorithms -- Hardware attacks -- Multi-party computation, voting schemes, digital signature schemes -- Web security -- DBMS and Application Security -- Biometrics -- Software Security -- Network Security -- Formal Methods and Assurance -- Sensor and Ad Hoc Networks -- DOS -- Privacy-preserving data mining -- Private information retrieval -- Privacy metrics and data protection -- Wireless Security -- Broadcast channel, secret sharing, threshold schemes, subliminal channels -- Risk management and organizational security and privacy -- Usable/user-centric privacy -- Less-constrained biometrics -- Access and Query Privacy -- Cryptocurrencies -- Encryption-Based Access Control Based on Public Key Cryptography -- Cyber-physical systems and infrastructure: security andprivacy -- Location privacy and privacy in locations-based applications -- Privacy in emerging scenarios -- Privacy and security in social networks -- Economics of security and privacy -- Key management -- Elliptic curve cryptography -- Sequences, Boolean functions, stream ciphers -- Secure multiparty computations -- Human Aspects in Security and Privacy -- Trustworthy Computing, Physical/Hardware Security -- AI approaches for security and privacy -- Privacy and anonymity in communication networks -- Privacy laws and directives.
Contained By:
Springer Nature eReference
Subject:
Cryptography - Encyclopedias. -
Online resource:
https://doi.org/10.1007/978-3-030-71522-9
ISBN:
9783030715229
Encyclopedia of cryptography, security and privacy
Encyclopedia of cryptography, security and privacy
[electronic resource] /edited by Sushil Jajodia, Pierangela Samarati, Moti Yung. - Third edition. - Cham :Springer Nature Switzerland :2025. - lxi, 2817 p. :ill. (some col.), digital ;24 cm.
Security Policies and Access Control -- Public key encryption, digital signatures -- Number theory, primality tests, discrete log, factorisation -- Public-key cryptography, hardware, physical attacks -- Implementation aspects of cryptographic algorithms -- Hardware attacks -- Multi-party computation, voting schemes, digital signature schemes -- Web security -- DBMS and Application Security -- Biometrics -- Software Security -- Network Security -- Formal Methods and Assurance -- Sensor and Ad Hoc Networks -- DOS -- Privacy-preserving data mining -- Private information retrieval -- Privacy metrics and data protection -- Wireless Security -- Broadcast channel, secret sharing, threshold schemes, subliminal channels -- Risk management and organizational security and privacy -- Usable/user-centric privacy -- Less-constrained biometrics -- Access and Query Privacy -- Cryptocurrencies -- Encryption-Based Access Control Based on Public Key Cryptography -- Cyber-physical systems and infrastructure: security andprivacy -- Location privacy and privacy in locations-based applications -- Privacy in emerging scenarios -- Privacy and security in social networks -- Economics of security and privacy -- Key management -- Elliptic curve cryptography -- Sequences, Boolean functions, stream ciphers -- Secure multiparty computations -- Human Aspects in Security and Privacy -- Trustworthy Computing, Physical/Hardware Security -- AI approaches for security and privacy -- Privacy and anonymity in communication networks -- Privacy laws and directives.
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas. The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.
ISBN: 9783030715229
Standard No.: 10.1007/978-3-030-71522-9doiSubjects--Topical Terms:
895926
Cryptography
--Encyclopedias.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Encyclopedia of cryptography, security and privacy
LDR
:04098nmm a2200373 a 4500
001
2408496
003
DE-He213
005
20250111115247.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783030715229
$q
(electronic bk.)
020
$a
9783030715205
$q
(paper)
024
7
$a
10.1007/978-3-030-71522-9
$2
doi
035
$a
978-3-030-71522-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UMB
$2
bicssc
072
7
$a
GPF
$2
bicssc
072
7
$a
COM021000
$2
bisacsh
072
7
$a
UMB
$2
thema
072
7
$a
GPF
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
E56 2025
245
0 0
$a
Encyclopedia of cryptography, security and privacy
$h
[electronic resource] /
$c
edited by Sushil Jajodia, Pierangela Samarati, Moti Yung.
250
$a
Third edition.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
lxi, 2817 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Security Policies and Access Control -- Public key encryption, digital signatures -- Number theory, primality tests, discrete log, factorisation -- Public-key cryptography, hardware, physical attacks -- Implementation aspects of cryptographic algorithms -- Hardware attacks -- Multi-party computation, voting schemes, digital signature schemes -- Web security -- DBMS and Application Security -- Biometrics -- Software Security -- Network Security -- Formal Methods and Assurance -- Sensor and Ad Hoc Networks -- DOS -- Privacy-preserving data mining -- Private information retrieval -- Privacy metrics and data protection -- Wireless Security -- Broadcast channel, secret sharing, threshold schemes, subliminal channels -- Risk management and organizational security and privacy -- Usable/user-centric privacy -- Less-constrained biometrics -- Access and Query Privacy -- Cryptocurrencies -- Encryption-Based Access Control Based on Public Key Cryptography -- Cyber-physical systems and infrastructure: security andprivacy -- Location privacy and privacy in locations-based applications -- Privacy in emerging scenarios -- Privacy and security in social networks -- Economics of security and privacy -- Key management -- Elliptic curve cryptography -- Sequences, Boolean functions, stream ciphers -- Secure multiparty computations -- Human Aspects in Security and Privacy -- Trustworthy Computing, Physical/Hardware Security -- AI approaches for security and privacy -- Privacy and anonymity in communication networks -- Privacy laws and directives.
520
$a
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas. The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.
650
0
$a
Cryptography
$v
Encyclopedias.
$3
895926
650
0
$a
Computer security
$v
Encyclopedias.
$3
3781013
650
1 4
$a
Data Structures and Information Theory.
$3
3382368
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Coding and Information Theory.
$3
891252
700
1
$a
Jajodia, Sushil.
$3
745398
700
1
$a
Samarati, Pierangela.
$3
833129
700
1
$a
Yung, Moti.
$3
840234
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eReference
856
4 0
$u
https://doi.org/10.1007/978-3-030-71522-9
950
$a
Computer Science (SpringerNature-11645)
950
$a
Reference Module Computer Science and Engineering (SpringerNature-43748)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9513994
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login