Functional Encryption (Record no. 78644)

000 -LEADER
fixed length control field 03617nam a22005775i 4500
001 - CONTROL NUMBER
control field 978-3-030-60890-3
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801220519.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210612s2021 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783030608903
-- 978-3-030-60890-3
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
245 10 - TITLE STATEMENT
Title Functional Encryption
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages X, 309 p. 84 illus., 18 illus. in color.
490 1# - SERIES STATEMENT
Series statement EAI/Springer Innovations in Communication and Computing,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Foundations of Functional Encryption -- Mathematical Concepts and Properties -- Elliptic Curve Cryptography -- XTR Algorithm: Efficient and Compact Subgroup Trace Representation -- HECC: Hyperelliptic Curve Cryptography -- Pairing-Based Cryptography -- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units -- Cocks IBE Scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchical IBE -- Extensions of IBE and Related Primitives -- Attribute Based Encryption -- Digital Signatures -- Applications of Functional Encryption -- IRON: Functional Encryption Using Intel SGX -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
700 1# - AUTHOR 2
Author 2 Ahmad, Khairol Amali Bin.
700 1# - AUTHOR 2
Author 2 Ahmad, Khaleel.
700 1# - AUTHOR 2
Author 2 Dulhare, Uma N.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-030-60890-3
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information theory.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mathematics.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Structures and Information Theory.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Applications of Mathematics.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2522-8609
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.