Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Number theory --- Algebra --- Computer science --- Computer. Automation --- algebra --- DES (data encryption standard) --- informatica --- wiskunde --- getallenleer
Choose an application
A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.
Human sciences (algemeen) --- Social sciences (general) --- Law --- Telecommunication technology --- Applied physical engineering --- Mass communications --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- computervisie --- mediarecht --- bedrijfseconomie --- grafische vormgeving --- massamedia --- sociale wetenschappen --- wetgeving --- cultuurwetenschap --- informatiesystemen --- tekstverwerking --- informatica management --- ingenieurswetenschappen --- communicatietechnologie
Choose an application
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included. This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.
Number theory --- Engineering sciences. Technology --- Computer science --- Computer. Automation --- analyse (wiskunde) --- toegepaste informatica --- DES (data encryption standard) --- informatica --- wiskunde --- ingenieurswetenschappen --- getallenleer
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
Applied marketing --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- veiligheid (technologie) --- cryptologie --- e-business --- computers --- informatica --- e-commerce --- programmatielogica --- computerbeveiliging --- computerkunde
Choose an application
Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.
Discrete mathematics --- Computer science --- Information systems --- Computer. Automation --- discrete wiskunde --- cryptologie --- computers --- informatica --- programmatielogica --- computerkunde
Choose an application
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field.
Discrete mathematics --- Production management --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- betrouwbaarheid --- discrete wiskunde --- computers --- informatica --- informatietechnologie --- wiskunde --- OS (operating system) --- computerkunde
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- cryptografie --- complexe analyse (wiskunde) --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computernetwerken
Listing 1 - 8 of 8 |
Sort by
|