top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptography for Security and Privacy in Cloud Computing
Cryptography for Security and Privacy in Cloud Computing
Autore Rass Stefan
Pubbl/distr/stampa Norwood : , : Artech House, , 2013
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8/2
Altri autori (Persone) SlamanigDaniel
Collana Artech House information security and privacy series
Soggetto topico Computer networks - Security measures
Cloud computing
Soggetto genere / forma Electronic books.
ISBN 1-60807-576-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar.
Record Nr. UNINA-9910465187503321
Rass Stefan  
Norwood : , : Artech House, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography for Security and Privacy in Cloud Computing
Cryptography for Security and Privacy in Cloud Computing
Autore Rass Stefan
Pubbl/distr/stampa Norwood : , : Artech House, , 2013
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8/2
Altri autori (Persone) SlamanigDaniel
Collana Artech House information security and privacy series
Soggetto topico Computer networks - Security measures
Cloud computing
ISBN 1-60807-576-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar.
Record Nr. UNINA-9910792134903321
Rass Stefan  
Norwood : , : Artech House, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography for Security and Privacy in Cloud Computing
Cryptography for Security and Privacy in Cloud Computing
Autore Rass Stefan
Pubbl/distr/stampa Norwood : , : Artech House, , 2013
Descrizione fisica 1 online resource (264 p.)
Disciplina 005.8/2
Altri autori (Persone) SlamanigDaniel
Collana Artech House information security and privacy series
Soggetto topico Computer networks - Security measures
Cloud computing
ISBN 1-60807-576-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar.
Record Nr. UNINA-9910820080803321
Rass Stefan  
Norwood : , : Artech House, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu
Autore Rass Stefan
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (299 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
Game theory
System safety
Computer crimes
Systems and Data Security
Game Theory, Economics, Social and Behav. Sciences
Security Science and Technology
Game Theory
Cybercrime
ISBN 3-030-46908-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Introduction -- 1. Introduction -- 2. Critical Infrastructures -- 3. Mathematical Decision Making -- 4. Types of Games -- 5. Bounded Rationality -- Part II Security Games -- 6. Risk Management -- 7. Insurance -- 8. Patrolling and Surveillance Games. 9. Optimal Inspection Plans -- 10. Defense-in-Depth-Games -- 11. Cryptographic Games -- 12. Practicalities -- Acronyms -- Glossary -- List of Symbols -- Index.
Record Nr. UNISA-996465371103316
Rass Stefan  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber-Security in Critical Infrastructures : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu
Cyber-Security in Critical Infrastructures : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu
Autore Rass Stefan
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (299 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
Game theory
System safety
Computer crimes
Systems and Data Security
Game Theory, Economics, Social and Behav. Sciences
Security Science and Technology
Game Theory
Cybercrime
ISBN 3-030-46908-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Introduction -- 1. Introduction -- 2. Critical Infrastructures -- 3. Mathematical Decision Making -- 4. Types of Games -- 5. Bounded Rationality -- Part II Security Games -- 6. Risk Management -- 7. Insurance -- 8. Patrolling and Surveillance Games. 9. Optimal Inspection Plans -- 10. Defense-in-Depth-Games -- 11. Cryptographic Games -- 12. Practicalities -- Acronyms -- Glossary -- List of Symbols -- Index.
Record Nr. UNINA-9910410054403321
Rass Stefan  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui