Cryptography : (Record no. 61269)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07213nam a22004933i 4500 |
001 - CONTROL NUMBER | |
control field | EBC3021394 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240729124150.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2012 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781621008316 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781621007791 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC3021394 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL3021394 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr10683052 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)831676496 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 -- C846 2012eb |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/2 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Lek, Kamol. |
245 10 - TITLE STATEMENT | |
Title | Cryptography : |
Remainder of title | Protocols, Design, and Applications. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | New York : |
Name of producer, publisher, distributor, manufacturer | Nova Science Publishers, Incorporated, |
Date of production, publication, distribution, manufacture, or copyright notice | 2012. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2012. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (254 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | Cryptography, Steganography and Data Security |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Intro -- CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS -- CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS -- LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA -- CONTENTS -- PREFACE -- Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY -- Abstract -- 1. Introduction -- 1.1. Historical Background -- 1.2. Quantum Information Theory -- 1.3. Emerging Quantum Influences -- 2. Private Communication on the Quantum Channel -- 2.1. The Private Quantum Channel -- 2.2. The Private Capacity of a Quantum Channel -- 2.3. The Non-additivity of Private Information -- 3. Quantum Bit Commitment -- 3.1. History of Quantum Bit Commitment -- 3.2. Description of Quantum Bit Commitment -- 3.3. Security of the Bit Commitment Protocol -- 4. Quantum Oblivious Transfer -- 4.1. History of Quantum Oblivious Transfer -- 5. Quantum Fingerprinting -- 5.1. History of Quantum Fingerprinting -- 5.2. Description of Quantum Fingerprinting -- 6. Quantum Digital Signatures -- 6.1. History of Quantum Digital Signatures -- 6.2. Description of Quantum Digital Signatures -- 7. Quantum Authentication -- 7.1. Description of Quantum Authentication -- 8. Uncloneable Quantum Encryption and QuantumAuthentication -- 8.1. Description of Uncloneable Quantum Encryption -- 8.2. Security of the Uncloneable Quantum Encryption Scheme -- 9. Quantum Secret Sharing -- 9.1. Description of Quantum Secret Sharing -- 9.2. Quantum Protocol for Sharing Classical Information -- 9.3. Quantum Protocol for Sharing Quantum Information -- 10. The Quantum Public Key Scheme -- 10.1. History of Quantum Public Key Scheme -- 10.2. Description of Quantum Public Key Scheme -- 10.3. Security of the Quantum Public Key Protocol -- 10.4. Eve's Attack on the Quantum Public Key Method -- 10.5. Behind the Security of the Quantum Public Key Protocol -- 11. Quantum Money -- 11.1. History of Quantum Money. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 11.2. Description of Quantum Money -- 11.3. New Models of Quantum Money -- 12. Conclusions -- 13. Further Reading -- Author Biographies -- References -- Chapter 2: LOW-COST MUTUAL AUTHENTICATION PROTOCOLS -- Introduction -- Lightweight Mutual Authentication Protocols -- The Karthikeyan and Nesterenko Protocol -- The Duc et al. Protocol -- The Chien and Chen Protocol -- The Li et al. Protocol -- The Chien and Huang Protocol -- The Chen and Deng Protocol -- The Qingling et al. Protocol -- The Sun and Ting Protocol -- Ultralightweight Mutual Authentication Protocols -- The M2AP, EMAP, and LMAP Protocols -- The Strong Authentication and Strong Integrity (SASI) Protocol -- The Gossamer Protocol -- Associated Protocols -- Summary -- References -- Chapter 3: A HIGHLY EFFICIENT VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES -- Abstract -- 1. Introduction -- 2. Related Works -- 2.1. (2, 2) VSSM Schemes -- 2.2. (k, n)-m-VSSM Schemes -- 3. Encryption Algorithm -- 3.1. (2, 2)-2-VSSM Schemes -- 3.2. Refine the Recovered Images -- 4. Implementation Results and Security Analysis -- 4.1. Performance Evaluations -- 4.2. Security Analysis -- 4.3. Comparison with Previous Approach -- 5. Conclusion -- References -- Chapter 4: MULTI LAYER QKD PROTOCOL USING CORRELATED PHOTON OF DARK SOLITON ARRAY IN A WAVELENGTH ROUTER -- Abstract -- 1. Introduction -- 2. Dark Soliton Array Generation -- 3. Multi Layers Quantum Router -- 4. Proposed Protocol -- 4. Discussion -- 4. Conclusion -- References -- Chapter 5: CHAOS-BASED CRYPTOSYSTEM IN DIFFERENT MODES OF BLOCK ENCRYPTION -- Abstract -- 1. Introduction -- 2. Objective of the Chapter -- 3. Proposed Encryption Algorithm -- 3.1. Design of the Cryptosystem Using the CBC Mode -- 3.2. Design of the Cryptosystem Using the CFB Mode -- 3.3. Design of the Cryptosystem Using the OFB Mode. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 4. Security and Performance Evaluation of the Cryptosystem -- 4.1. Encryption and Decryption Speed -- 4.2. Key Sensitivity -- 4.3. Resistance to Brute Force Attack -- 4.4. Resistance to Classical Attacks -- 5. Conclusion -- References -- Chapter 6: THE MATHEMATICAL CRYPTOGRAPHY OF THERSA CRYPTOSYSTEM -- Abstract -- 1. Introduction -- 2. The Mathematics of the RSA Cryptosystem -- 2.1. The Basic Mathematics -- 2.2. The Basic RSA Cryptosystem -- 2.3. Elementary Attacks on RSA -- 3. Diophantine Approximations -- 3.1. Continued Fractions -- 3.2. Attacks on RSA Using Continued Fractions -- 4. Lattices -- 4.1. Lattices Preliminaries and the LLL Algorithm -- 4.2. Attacks on RSA Using Lattice Reduction -- 5. Conclusion -- References -- Chapter 7: QUANTUM SECURE COMMUNICATION -- Abstract -- 1. Introduction -- 2. Some Techniques of Classical Cryptography -- 2.1. Historical Brief -- 2.2. Cryptography Algorithms -- 3. Quantum Cryptography -- 3.1. BB84 Protocol -- 3.2. EPR Protocol & -- B92 Protocol -- 4. Other Protocols -- 4.1. Quantum Communication Using Discrete Variables -- 4.2. DSQC with Quantum Teleportation and Entanglement Swapping -- 4.3. Quantum Communication via Continuous Variable -- 5. Conclusion -- References -- Chapter 8: SECURITY RISK MEASURING AND FORECASTING -- Abstract -- 1. Introduction -- 2. A Game-Theoretic View on Security -- 2.1. Elements of Game-Theory -- 2.2. Risk Estimates from Zero-Sum Competitions -- 3. Modeling -- 3.1. Modeling: The General Case -- 3.2. Refining the Model -- 4. Risk Forecasting -- 4.1. Bayesian Updating -- 4.2. Forecasting: The Univariate Case -- 4.3. Forecasting: The Multivariate Case -- 5. Conclusion -- References -- INDEX. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Rajapakse, Naruemol. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Lek, Kamol |
Title | Cryptography |
Place, publisher, and date of publication | New York : Nova Science Publishers, Incorporated,c2012 |
International Standard Book Number | 9781621007791 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Cryptography, Steganography and Data Security |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3021394">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3021394</a> |
Public note | Click to View |
No items available.