Télécharger le livre :  Fault-Tolerant Distributed Consensus in Synchronous Networks
Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the problem by Lamport et al in 1982, the problem has been widely studied, both in cryptography as well as distributed...

Editeur : Springer
Parution : 2025-03-24
Collection : Information Security and Cryptography PDF

116,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Complete Guide to SCION
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this...

Editeur : Springer
Parution : 2022-05-16
Collection : Information Security and Cryptography PDF

94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Design of Rijndael
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology.The authors developed the Rijndael algorithm...

Editeur : Springer
Parution : 2020-05-23
Collection : Information Security and Cryptography PDF

168,79

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Modelling and Verification of Secure Exams
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management...

Editeur : Springer
Parution : 2018-03-19
Collection : Information Security and Cryptography PDF

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Secure Data Deletion
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage...

Editeur : Springer
Parution : 2016-11-02
Collection : Information Security and Cryptography PDF

126,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Signcryption
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not...

Editeur : Springer
Parution : 2010-11-11
Collection : Information Security and Cryptography ePub

94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Towards Hardware-Intrinsic Security
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required...

Editeur : Springer
Parution : 2010-11-03
Collection : Information Security and Cryptography ePub

147,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Efficient Secure Two-Party Protocols
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and...

Editeur : Springer
Parution : 2010-11-02
Collection : Information Security and Cryptography PDF

168,79

Téléchargement immédiat
Dès validation de votre commande
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze- knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their...

Editeur : Springer
Parution : 2007-05-16
Collection : Information Security and Cryptography PDF

94,94

Téléchargement immédiat
Dès validation de votre commande