pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: PRACTICAL SIGNCRYPTION
By: Alexander W. Dent (Editor), Yuliang Zheng (Editor), Moti Yung (Foreword)
Format: Paperback

List price: £123.00


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3642265936
ISBN 13: 9783642265938
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 27 December, 2012
Edition: 2010 ed.
Series: Information Security and Cryptography
Pages: 274
Synopsis: In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the "encrypt-then-sign" method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems.Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.
Illustrations: biography
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002 (PB)
ADVANCES IN CRYPTOLOGY - AUSCRYPT '92 (PB)
ADVANCES IN CRYPTOLOGY - CRYPTO 2002 (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
COMPUTER SECURITY -- ESORICS 2012 (PB)
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
DIGITAL RIGHTS MANAGEMENT (PB)
DIGITAL SIGNATURES (HB)
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY (PB)
NETWORK AND SYSTEM SECURITY (PB)
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016. MALICIOUS AND EXPLORATORY CRYPTOLOGY (PB)
PRACTICAL SIGNCRYPTION (HB)
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007 (PB)
PUBLIC KEY CRYPTOGRAPHY (PB)
PUBLIC KEY CRYPTOGRAPHY (PB)
PUBLIC KEY CRYPTOGRAPHY (PB)
PUBLIC KEY CRYPTOGRAPHY - PPK (PB)
SECURITY AND CRYPTOGRAPHY FOR NETWORKS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TUNABLE MULTIBAND FERROELECTRIC DEVICES FOR RECONFIGURABLE RF-FRONTENDS (HB)
TUNABLE MULTIBAND FERROELECTRIC DEVICES FOR RECONFIGURABLE RF-FRONTENDS (PB)

TOP SELLERS IN THIS CATEGORY
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
The LISP Network (Paperback)
Pearson Education (US)
Our Price : £39.59
more details
The Network Security Test Lab (Paperback)
John Wiley & Sons Inc
Our Price : £35.10
more details
Swift in the Cloud (Paperback)
John Wiley & Sons Inc
Our Price : £9.30
more details
Linux All-in-One For Dummies, 7th Edition (Paperback / softback)
By: Blum
John Wiley & Sons Inc
Our Price : £19.59
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket