ORPP logo

Cryptography : (Record no. 61269)

MARC details
000 -LEADER
fixed length control field 07213nam a22004933i 4500
001 - CONTROL NUMBER
control field EBC3021394
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729124150.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2012 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781621008316
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781621007791
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC3021394
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL3021394
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10683052
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)831676496
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25 -- C846 2012eb
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lek, Kamol.
245 10 - TITLE STATEMENT
Title Cryptography :
Remainder of title Protocols, Design, and Applications.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer Nova Science Publishers, Incorporated,
Date of production, publication, distribution, manufacture, or copyright notice 2012.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (254 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Cryptography, Steganography and Data Security
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS -- CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS -- LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA -- CONTENTS -- PREFACE -- Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY -- Abstract -- 1. Introduction -- 1.1. Historical Background -- 1.2. Quantum Information Theory -- 1.3. Emerging Quantum Influences -- 2. Private Communication on the Quantum Channel -- 2.1. The Private Quantum Channel -- 2.2. The Private Capacity of a Quantum Channel -- 2.3. The Non-additivity of Private Information -- 3. Quantum Bit Commitment -- 3.1. History of Quantum Bit Commitment -- 3.2. Description of Quantum Bit Commitment -- 3.3. Security of the Bit Commitment Protocol -- 4. Quantum Oblivious Transfer -- 4.1. History of Quantum Oblivious Transfer -- 5. Quantum Fingerprinting -- 5.1. History of Quantum Fingerprinting -- 5.2. Description of Quantum Fingerprinting -- 6. Quantum Digital Signatures -- 6.1. History of Quantum Digital Signatures -- 6.2. Description of Quantum Digital Signatures -- 7. Quantum Authentication -- 7.1. Description of Quantum Authentication -- 8. Uncloneable Quantum Encryption and QuantumAuthentication -- 8.1. Description of Uncloneable Quantum Encryption -- 8.2. Security of the Uncloneable Quantum Encryption Scheme -- 9. Quantum Secret Sharing -- 9.1. Description of Quantum Secret Sharing -- 9.2. Quantum Protocol for Sharing Classical Information -- 9.3. Quantum Protocol for Sharing Quantum Information -- 10. The Quantum Public Key Scheme -- 10.1. History of Quantum Public Key Scheme -- 10.2. Description of Quantum Public Key Scheme -- 10.3. Security of the Quantum Public Key Protocol -- 10.4. Eve's Attack on the Quantum Public Key Method -- 10.5. Behind the Security of the Quantum Public Key Protocol -- 11. Quantum Money -- 11.1. History of Quantum Money.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 11.2. Description of Quantum Money -- 11.3. New Models of Quantum Money -- 12. Conclusions -- 13. Further Reading -- Author Biographies -- References -- Chapter 2: LOW-COST MUTUAL AUTHENTICATION PROTOCOLS -- Introduction -- Lightweight Mutual Authentication Protocols -- The Karthikeyan and Nesterenko Protocol -- The Duc et al. Protocol -- The Chien and Chen Protocol -- The Li et al. Protocol -- The Chien and Huang Protocol -- The Chen and Deng Protocol -- The Qingling et al. Protocol -- The Sun and Ting Protocol -- Ultralightweight Mutual Authentication Protocols -- The M2AP, EMAP, and LMAP Protocols -- The Strong Authentication and Strong Integrity (SASI) Protocol -- The Gossamer Protocol -- Associated Protocols -- Summary -- References -- Chapter 3: A HIGHLY EFFICIENT VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES -- Abstract -- 1. Introduction -- 2. Related Works -- 2.1. (2, 2) VSSM Schemes -- 2.2. (k, n)-m-VSSM Schemes -- 3. Encryption Algorithm -- 3.1. (2, 2)-2-VSSM Schemes -- 3.2. Refine the Recovered Images -- 4. Implementation Results and Security Analysis -- 4.1. Performance Evaluations -- 4.2. Security Analysis -- 4.3. Comparison with Previous Approach -- 5. Conclusion -- References -- Chapter 4: MULTI LAYER QKD PROTOCOL USING CORRELATED PHOTON OF DARK SOLITON ARRAY IN A WAVELENGTH ROUTER -- Abstract -- 1. Introduction -- 2. Dark Soliton Array Generation -- 3. Multi Layers Quantum Router -- 4. Proposed Protocol -- 4. Discussion -- 4. Conclusion -- References -- Chapter 5: CHAOS-BASED CRYPTOSYSTEM IN DIFFERENT MODES OF BLOCK ENCRYPTION -- Abstract -- 1. Introduction -- 2. Objective of the Chapter -- 3. Proposed Encryption Algorithm -- 3.1. Design of the Cryptosystem Using the CBC Mode -- 3.2. Design of the Cryptosystem Using the CFB Mode -- 3.3. Design of the Cryptosystem Using the OFB Mode.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Security and Performance Evaluation of the Cryptosystem -- 4.1. Encryption and Decryption Speed -- 4.2. Key Sensitivity -- 4.3. Resistance to Brute Force Attack -- 4.4. Resistance to Classical Attacks -- 5. Conclusion -- References -- Chapter 6: THE MATHEMATICAL CRYPTOGRAPHY OF THERSA CRYPTOSYSTEM -- Abstract -- 1. Introduction -- 2. The Mathematics of the RSA Cryptosystem -- 2.1. The Basic Mathematics -- 2.2. The Basic RSA Cryptosystem -- 2.3. Elementary Attacks on RSA -- 3. Diophantine Approximations -- 3.1. Continued Fractions -- 3.2. Attacks on RSA Using Continued Fractions -- 4. Lattices -- 4.1. Lattices Preliminaries and the LLL Algorithm -- 4.2. Attacks on RSA Using Lattice Reduction -- 5. Conclusion -- References -- Chapter 7: QUANTUM SECURE COMMUNICATION -- Abstract -- 1. Introduction -- 2. Some Techniques of Classical Cryptography -- 2.1. Historical Brief -- 2.2. Cryptography Algorithms -- 3. Quantum Cryptography -- 3.1. BB84 Protocol -- 3.2. EPR Protocol &amp -- B92 Protocol -- 4. Other Protocols -- 4.1. Quantum Communication Using Discrete Variables -- 4.2. DSQC with Quantum Teleportation and Entanglement Swapping -- 4.3. Quantum Communication via Continuous Variable -- 5. Conclusion -- References -- Chapter 8: SECURITY RISK MEASURING AND FORECASTING -- Abstract -- 1. Introduction -- 2. A Game-Theoretic View on Security -- 2.1. Elements of Game-Theory -- 2.2. Risk Estimates from Zero-Sum Competitions -- 3. Modeling -- 3.1. Modeling: The General Case -- 3.2. Refining the Model -- 4. Risk Forecasting -- 4.1. Bayesian Updating -- 4.2. Forecasting: The Univariate Case -- 4.3. Forecasting: The Multivariate Case -- 5. Conclusion -- References -- INDEX.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rajapakse, Naruemol.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Lek, Kamol
Title Cryptography
Place, publisher, and date of publication New York : Nova Science Publishers, Incorporated,c2012
International Standard Book Number 9781621007791
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Cryptography, Steganography and Data Security
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3021394">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3021394</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.