LEADER 03646nam 2200625 450 001 9910465187503321 005 20200520144314.0 010 $a1-60807-576-1 035 $a(CKB)2560000000254530 035 $a(EBL)1463547 035 $a(OCoLC)905527313 035 $a(SSID)ssj0001437303 035 $a(PQKBManifestationID)12633088 035 $a(PQKBTitleCode)TC0001437303 035 $a(PQKBWorkID)11444885 035 $a(PQKB)11594969 035 $a(MiAaPQ)EBC1463547 035 $a(Au-PeEL)EBL1463547 035 $a(CaPaEBR)ebr11069356 035 $a(CaBNVSL)mat09101060 035 $a(IEEE)9101060 035 $a(EXLCZ)992560000000254530 100 $a20200730d2013 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography for Security and Privacy in Cloud Computing 210 1$aNorwood :$cArtech House,$d2013. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2013] 215 $a1 online resource (264 p.) 225 1 $aArtech House information security and privacy series 300 $aDescription based upon print version of record. 311 $a1-60807-575-3 320 $aIncludes bibliographical references and index. 327 $aCryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES. 327 $a2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar. 330 $aAs is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers. This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each. 410 0$aArtech House information security and privacy series. 606 $aComputer networks$xSecurity measures 606 $aCloud computing 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures. 615 0$aCloud computing. 676 $a005.8/2 700 $aRass$b Stefan$0802082 701 $aSlamanig$b Daniel$0861835 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910465187503321 996 $aCryptography for Security and Privacy in Cloud Computing$91923416 997 $aUNINA