Cryptography for Security and Privacy in Cloud Computing |
Autore | Rass Stefan |
Pubbl/distr/stampa | Norwood : , : Artech House, , 2013 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) | SlamanigDaniel |
Collana | Artech House information security and privacy series |
Soggetto topico |
Computer networks - Security measures
Cloud computing |
Soggetto genere / forma | Electronic books. |
ISBN | 1-60807-576-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar. |
Record Nr. | UNINA-9910465187503321 |
Rass Stefan | ||
Norwood : , : Artech House, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography for Security and Privacy in Cloud Computing |
Autore | Rass Stefan |
Pubbl/distr/stampa | Norwood : , : Artech House, , 2013 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) | SlamanigDaniel |
Collana | Artech House information security and privacy series |
Soggetto topico |
Computer networks - Security measures
Cloud computing |
ISBN | 1-60807-576-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar. |
Record Nr. | UNINA-9910792134903321 |
Rass Stefan | ||
Norwood : , : Artech House, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography for Security and Privacy in Cloud Computing |
Autore | Rass Stefan |
Pubbl/distr/stampa | Norwood : , : Artech House, , 2013 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) | SlamanigDaniel |
Collana | Artech House information security and privacy series |
Soggetto topico |
Computer networks - Security measures
Cloud computing |
ISBN | 1-60807-576-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar. |
Record Nr. | UNINA-9910820080803321 |
Rass Stefan | ||
Norwood : , : Artech House, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu |
Autore | Rass Stefan |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (299 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Game theory System safety Computer crimes Systems and Data Security Game Theory, Economics, Social and Behav. Sciences Security Science and Technology Game Theory Cybercrime |
ISBN | 3-030-46908-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1. Introduction -- 1. Introduction -- 2. Critical Infrastructures -- 3. Mathematical Decision Making -- 4. Types of Games -- 5. Bounded Rationality -- Part II Security Games -- 6. Risk Management -- 7. Insurance -- 8. Patrolling and Surveillance Games. 9. Optimal Inspection Plans -- 10. Defense-in-Depth-Games -- 11. Cryptographic Games -- 12. Practicalities -- Acronyms -- Glossary -- List of Symbols -- Index. |
Record Nr. | UNISA-996465371103316 |
Rass Stefan | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber-Security in Critical Infrastructures : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu |
Autore | Rass Stefan |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (299 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Game theory System safety Computer crimes Systems and Data Security Game Theory, Economics, Social and Behav. Sciences Security Science and Technology Game Theory Cybercrime |
ISBN | 3-030-46908-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1. Introduction -- 1. Introduction -- 2. Critical Infrastructures -- 3. Mathematical Decision Making -- 4. Types of Games -- 5. Bounded Rationality -- Part II Security Games -- 6. Risk Management -- 7. Insurance -- 8. Patrolling and Surveillance Games. 9. Optimal Inspection Plans -- 10. Defense-in-Depth-Games -- 11. Cryptographic Games -- 12. Practicalities -- Acronyms -- Glossary -- List of Symbols -- Index. |
Record Nr. | UNINA-9910410054403321 |
Rass Stefan | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|