Contemporary cryptology : (Record no. 59514)

000 -LEADER
fixed length control field 04806nam a2201093 i 4500
001 - CONTROL NUMBER
control field 5265879
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421114115.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100317t20151992njua ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780470544327
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
082 04 - CLASSIFICATION NUMBER
Call Number 005.8/2
245 00 - TITLE STATEMENT
Title Contemporary cryptology :
Sub Title the science of information integrity /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (xv, 640 pages) :
500 ## - GENERAL NOTE
Remark 1 "The Institute of Electrical and Electronics Engineers, Inc., New York."
500 ## - GENERAL NOTE
Remark 1 "IEEE order number: PC0271-7"--T.p. verso.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 The data encryption standard : past and future / Miles E. Smid, Dennis K. Branstad -- Stream ciphers / Rainer A. Rueppel -- The first ten years of public key cryptology / Whitfield Diffie -- Public key cryptography / James Nechvatal -- A comparison of practical public key cryptosystems based on integer factorization and discrete logarithms /
505 0# - FORMATTED CONTENTS NOTE
Remark 2 How to insure that data acquired to verify treaty compliance are trustworth / G.J. Simmons.
520 ## - SUMMARY, ETC.
Summary, etc The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Simmons, Gustavus J.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Piscataway, New Jersey :
-- IEEE Press,
-- c1992.
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [1999]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Description based on PDF viewed 12/21/2015.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication systems
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptography.
695 ## -
-- Aircraft
695 ## -
-- Algorithm design and analysis
695 ## -
-- Authentication
695 ## -
-- Biographies
695 ## -
-- Chapters
695 ## -
-- Complexity theory
695 ## -
-- Computational complexity
695 ## -
-- Computers
695 ## -
-- Cryptography
695 ## -
-- Digital signatures
695 ## -
-- Elliptic curve cryptography
695 ## -
-- Encryption
695 ## -
-- Forgery
695 ## -
-- Games
695 ## -
-- Generators
695 ## -
-- Gold
695 ## -
-- Indexes
695 ## -
-- Instruments
695 ## -
-- Interpolation
695 ## -
-- Laboratories
695 ## -
-- Law
695 ## -
-- Linear systems
695 ## -
-- Local area networks
695 ## -
-- Monitoring
695 ## -
-- NIST
695 ## -
-- Nonvolatile memory
695 ## -
-- Nuclear weapons
695 ## -
-- Parity check codes
695 ## -
-- Pins
695 ## -
-- Polynomials
695 ## -
-- Probabilistic logic
695 ## -
-- Proposals
695 ## -
-- Protocols
695 ## -
-- Public key
695 ## -
-- Public key cryptography
695 ## -
-- Radar
695 ## -
-- Receivers
695 ## -
-- Registers
695 ## -
-- Sections
695 ## -
-- Security
695 ## -
-- Sensors
695 ## -
-- Signal processing algorithms
695 ## -
-- Smart cards
695 ## -
-- Transmitters
695 ## -
-- Very large scale integration

No items available.