| 000 | 03503nam a22004815i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-23483-0 | ||
| 003 | DE-He213 | ||
| 005 | 20250710083928.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2005 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387234830 _a99780387234830 |
||
| 024 | 7 |
_a10.1007/0-387-23483-7 _2doi |
|
| 082 | 0 | 4 |
_a005.74 _223 |
| 100 | 1 |
_aTilborg, Henk C. A. _eeditor. |
|
| 245 | 1 | 0 |
_aEncyclopedia of Cryptography and Security _h[recurso electrónico] / _cedited by Henk C. A. Tilborg. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2005. |
|
| 300 |
_aeReference. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 520 | _aThis comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification.- Block ciphers and stream ciphers.- Computational issues.- Copy protection.- Cryptanalysis and security.- Cryptographic protocols.- Electronic payment and digital certificates.- Elliptic curve cryptography.- Factorization algorithms and primality tests.- Hash functions and MACs.- Historical systems.- Identity-based cryptography.- Implementation aspects for smart cards and standards.- Key management.- Multiparty computations like voting schemes.- Public key cryptography.- Quantum cryptography.- Secret sharing schemes.- Sequences.- Web security. The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aCODING THEORY. | |
| 650 | 0 | _aMATHEMATICS. | |
| 650 | 0 | _aENGINEERING MATHEMATICS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aCODING AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aAPPL.MATHEMATICS/COMPUTATIONAL METHODS OF ENGINEERING. |
| 650 | 2 | 4 | _aAPPLICATIONS OF MATHEMATICS. |
| 650 | 2 | 4 | _aSYSTEMS AND INFORMATION THEORY IN ENGINEERING. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387234731 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/0-387-23483-7 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c56215 _d56215 |
||