Status
Available
Call number
Library's review
Indeholder "Preface", "Chapter 1. Introduction", "Chapter 2. Background theory", "2.1 Mathematical methods", "2.2 Complexity theory", "2.3 Complexity of selected problems used in cryptology", "2.4 Information theory", "Chapter 3. Encryption methods of information protection", "3.1 Classical
Udmærket gennemgang af kryptering og brug til fx autentificering, identifikation og signering. Der er drysset virkende c-programmer ud rundt omkring i bogen, så man kan se teorien og virkeligheden side om side.
Show More
ciphers", "3.2 Symmetric algorithms and DES", "3.3 Asymmetric algorithms or public key cryptosystems", "Chapter 4. Authentication methods", "4.1 Elementary methods of message authentication", "4.2 Subliminal channel", "4.3 Digital signatures", "4.4 Other authentication techniques", "4.5 Summary", "Chapter 5. Cryptography in computer network security", "5.1 Information protection in computer networks", "5.2 Key management issues", "5.3 Electronic funds transfer (EFT)", "5.4 Summary", "Chapter 6. Application of cryptography in databases", "6.1 Database model", "6.2 Crytographic transformation preserving data structure", "6.3 Application of cryptography to protection of information during processing", "6.4 Privacy homomorphisms", "6.5 Summary", "Chapter 7. Other cryptographic techniques", "7.1 Linear feedback shift registers", "7.2 One-way ciphers and passwords", "7.3 Smart cards and information cards", "7.4 Unforgeable ID cards using smart cards", "7.5 Summary", "Chapter 8. Security in operating systems", "8.1 Access control in computer systems", "8.2 Implementations of access control systems", "8.3 Rationale for security evaluation classes", "8.4 Summary", "Chapter 9. Minimum knowledge systems", "9.1 An introduction to the minimum knowledge concept", "9.2 More on the Fiat-Shamir smart card protocol", "9.3 Subliminal free verification using minimum knowledge protocols", "9.4 Conclusion", "Appendix A", "A.1 Frequencies of occurrences of characters in languages", "A.2 Frequencies of occurrences of pairs of letters in languages", "Appendix B", "B.1 DES code", "B.2 Key representation for DES", "Appendix C. ", "C.1 Vigenere, Beauford or Variant Beauford code", "Bibliography", "Index".Udmærket gennemgang af kryptering og brug til fx autentificering, identifikation og signering. Der er drysset virkende c-programmer ud rundt omkring i bogen, så man kan se teorien og virkeligheden side om side.
Show Less
Publication
New York : Prentice-Hall, c1989.
Subjects
Language
Original language
Danish
Physical description
viii, 375 p.; 24.1 cm
ISBN
0131949861 / 9780131949867
Local notes
Omslag: Ikke angivet
Omslaget viser bare forfatter og titel som tekst
Indskannet omslag - N650U - 150 dpi
Omslaget viser bare forfatter og titel som tekst
Indskannet omslag - N650U - 150 dpi
Pages
viii; 375
DDC/MDS
005.8 |