LEADER 04984nam 22006735 450 001 9910983390903321 005 20250111115247.0 010 $a9783030715229 010 $a3030715221 024 7 $a10.1007/978-3-030-71522-9 035 $a(MiAaPQ)EBC31876505 035 $a(Au-PeEL)EBL31876505 035 $a(CKB)37194968600041 035 $a(DE-He213)978-3-030-71522-9 035 $a(OCoLC)1492964106 035 $a(EXLCZ)9937194968600041 100 $a20250111d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEncyclopedia of Cryptography, Security and Privacy /$fedited by Sushil Jajodia, Pierangela Samarati, Moti Yung 205 $a3rd ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (0 pages) 225 1 $aComputer Science Series 311 08$a9783030715205 311 08$a3030715205 327 $aSecurity Policies and Access Control -- Public key encryption, digital signatures -- Number theory, primality tests, discrete log, factorisation -- Public-key cryptography, hardware, physical attacks -- Implementation aspects of cryptographic algorithms -- Hardware attacks -- Multi-party computation, voting schemes, digital signature schemes -- Web security -- DBMS and Application Security -- Biometrics -- Software Security -- Network Security -- Formal Methods and Assurance -- Sensor and Ad Hoc Networks -- DOS -- Privacy-preserving data mining -- Private information retrieval -- Privacy metrics and data protection -- Wireless Security -- Broadcast channel, secret sharing, threshold schemes, subliminal channels -- Risk management and organizational security and privacy -- Usable/user-centric privacy -- Less-constrained biometrics -- Access and Query Privacy -- Cryptocurrencies -- Encryption-Based Access Control Based on Public Key Cryptography -- Cyber-physical systems and infrastructure: security andprivacy -- Location privacy and privacy in locations-based applications -- Privacy in emerging scenarios -- Privacy and security in social networks -- Economics of security and privacy -- Key management -- Elliptic curve cryptography -- Sequences, Boolean functions, stream ciphers -- Secure multiparty computations -- Human Aspects in Security and Privacy -- Trustworthy Computing, Physical/Hardware Security -- AI approaches for security and privacy -- Privacy and anonymity in communication networks -- Privacy laws and directives. 330 $aA rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas. The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics. . 410 0$aComputer Science Series 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aData Structures and Information Theory 606 $aCryptology 606 $aCoding and Information Theory 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aCoding theory. 615 14$aData Structures and Information Theory. 615 24$aCryptology. 615 24$aCoding and Information Theory. 676 $a652.803 700 $aJajodia$b Sushil$028486 701 $aSamarati$b Pierangela$01430844 701 $aYung$b Moti$01071902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983390903321 996 $aEncyclopedia of Cryptography, Security and Privacy$94317040 997 $aUNINA