000 04806nam a2201093 i 4500
001 5265879
003 IEEE
005 20200421114115.0
006 m o d
007 cr |n|||||||||
008 100317t20151992njua ob 001 0 eng d
020 _a9780470544327
_qelectronic
020 _z9780780353527
_qprint
020 _z0470544325
_qelectronic
024 7 _a10.1109/9780470544327
_2doi
035 _a(CaBNVSL)mat05265879
035 _a(IDAMS)0b000064810c5a47
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aQA76.9.A25
_bC6678 1992eb
082 0 4 _a005.8/2
_222
245 0 0 _aContemporary cryptology :
_bthe science of information integrity /
_cedited by Gustavus J. Simmons.
264 1 _aPiscataway, New Jersey :
_bIEEE Press,
_cc1992.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[1999]
300 _a1 PDF (xv, 640 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
500 _a"The Institute of Electrical and Electronics Engineers, Inc., New York."
500 _a"IEEE order number: PC0271-7"--T.p. verso.
504 _aIncludes bibliographical references and index.
505 0 _aThe data encryption standard : past and future / Miles E. Smid, Dennis K. Branstad -- Stream ciphers / Rainer A. Rueppel -- The first ten years of public key cryptology / Whitfield Diffie -- Public key cryptography / James Nechvatal -- A comparison of practical public key cryptosystems based on integer factorization and discrete logarithms /
505 0 _aHow to insure that data acquired to verify treaty compliance are trustworth / G.J. Simmons.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _aThe field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/21/2015.
650 0 _aComputer security.
650 0 _aTelecommunication systems
_xSecurity measures.
650 0 _aCryptography.
655 0 _aElectronic books.
695 _aAircraft
695 _aAlgorithm design and analysis
695 _aAuthentication
695 _aBiographies
695 _aChapters
695 _aComplexity theory
695 _aComputational complexity
695 _aComputers
695 _aCryptography
695 _aDigital signatures
695 _aElliptic curve cryptography
695 _aEncryption
695 _aForgery
695 _aGames
695 _aGenerators
695 _aGold
695 _aIndexes
695 _aInstruments
695 _aInterpolation
695 _aLaboratories
695 _aLaw
695 _aLinear systems
695 _aLocal area networks
695 _aMonitoring
695 _aNIST
695 _aNonvolatile memory
695 _aNuclear weapons
695 _aParity check codes
695 _aPins
695 _aPolynomials
695 _aProbabilistic logic
695 _aProposals
695 _aProtocols
695 _aPublic key
695 _aPublic key cryptography
695 _aRadar
695 _aReceivers
695 _aRegisters
695 _aSections
695 _aSecurity
695 _aSensors
695 _aSignal processing algorithms
695 _aSmart cards
695 _aTransmitters
695 _aVery large scale integration
700 1 _aSimmons, Gustavus J.
710 2 _aJohn Wiley & Sons,
_epublisher.
710 2 _aInstitute of Electrical and Electronics Engineers.
710 2 _aIEEE Xplore (Online service),
_edistributor.
776 0 8 _iPrint version:
_z9780780353527
856 4 2 _3Abstract with links to resource
_uhttp://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879
942 _cEBK
999 _c59514
_d59514