Télécharger le livre :  Fault-Tolerant Distributed Consensus in Synchronous Networks

Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the problem by Lamport et al in 1982, the problem has been widely studied, both in cryptography as well as distributed...
Editeur : Springer
Parution : 2025-03-24
Collection : Information Security and Cryptography
Format(s) : PDF
116,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Complete Guide to SCION

When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this...
Editeur : Springer
Parution : 2022-05-16
Collection : Information Security and Cryptography
Format(s) : PDF
94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity

There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard...
Editeur : Springer
Parution : 2021-04-30
Collection : Information Security and Cryptography
Format(s) : PDF, ePub
94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Design of Rijndael

This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology.The authors developed the Rijndael algorithm...
Editeur : Springer
Parution : 2020-05-23
Collection : Information Security and Cryptography
Format(s) : PDF
168,79

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Modelling and Verification of Secure Exams

In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management...
Editeur : Springer
Parution : 2018-03-19
Collection : Information Security and Cryptography
Format(s) : PDF
52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Secure Data Deletion

This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage...
Editeur : Springer
Parution : 2016-11-02
Collection : Information Security and Cryptography
Format(s) : PDF
126,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cryptography in Constant Parallel Time

Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this...
Editeur : Springer
Parution : 2013-12-19
Collection : Information Security and Cryptography
Format(s) : ePub
52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Signcryption

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not...
Editeur : Springer
Parution : 2010-11-11
Collection : Information Security and Cryptography
Format(s) : ePub
94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Towards Hardware-Intrinsic Security

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required...
Editeur : Springer
Parution : 2010-11-03
Collection : Information Security and Cryptography
Format(s) : ePub
147,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Efficient Secure Two-Party Protocols

In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and...
Editeur : Springer
Parution : 2010-11-02
Collection : Information Security and Cryptography
Format(s) : PDF
168,79

Téléchargement immédiat
Dès validation de votre commande

Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze- knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their...
Editeur : Springer
Parution : 2007-05-16
Collection : Information Security and Cryptography
Format(s) : PDF
94,94

Téléchargement immédiat
Dès validation de votre commande