Encyclopedia of Cryptography, Security and Privacy - Jajodia, Sushil; Samarati, Pierangela; Yung, Moti; (ed.) - Prospero Internet Bookshop

Encyclopedia of Cryptography, Security and Privacy
 
Product details:

ISBN13:9783030715205
ISBN10:3030715205
Binding:Hardback
No. of pages:2817 pages
Size:254x178 mm
Language:English
Illustrations: 325 Illustrations, black & white; 134 Illustrations, color
700
Category:

Encyclopedia of Cryptography, Security and Privacy

 
Edition number: Third Edition 2025
Publisher: Springer
Date of Publication:
Number of Volumes: 4 pieces, Book
 
Normal price:

Publisher's listprice:
EUR 1069.99
Estimated price in HUF:
465 124 HUF (442 975 HUF + 5% VAT)
Why estimated?
 
Your price:

372 099 (354 380 HUF + 5% VAT )
discount is: 20% (approx 93 025 HUF off)
Discount is valid until: 31 December 2024
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Long description:

A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas.



The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.



 

Table of Contents:
Security Policies and Access Control.- Public key encryption, digital signatures.- Number theory, primality tests, discrete log, factorisation.- Public-key cryptography, hardware, physical attacks.- Implementation aspects of cryptographic algorithms.- Hardware attacks.- Multi-party computation, voting schemes, digital signature schemes.- Web security.- DBMS and Application Security.- Biometrics.- Software Security.- Network Security.- Formal Methods and Assurance.- Sensor and Ad Hoc Networks.- DOS.- Privacy-preserving data mining.- Private information retrieval.- Privacy metrics and data protection.- Wireless Security.- Broadcast channel, secret sharing, threshold schemes, subliminal channels.- Risk management and organizational security and privacy.- Usable/user-centric privacy.- Less-constrained biometrics.- Access and Query Privacy.- Cryptocurrencies.- Encryption-Based Access Control Based on Public Key Cryptography.- Cyber-physical systems and infrastructure: security andprivacy.- Location privacy and privacy in locations-based applications.- Privacy in emerging scenarios.- Privacy and security in social networks.- Economics of security and privacy.- Key management.- Elliptic curve cryptography.- Sequences, Boolean functions, stream ciphers.- Secure multiparty computations.- Human Aspects in Security and Privacy.- Trustworthy Computing, Physical/Hardware Security.- AI approaches for security and privacy.- Privacy and anonymity in communication networks.- Privacy laws and directives.