Cryptography for Secure Encryption / Robert G. Underwood
| Cryptography for Secure Encryption / Robert G. Underwood |
| Autore | Underwood, Robert G. |
| Pubbl/distr/stampa | Cham, : Springer, 2022 |
| Descrizione fisica | xii, 319 p. : ill. ; 24 cm |
| Soggetto non controllato |
Automatic sequences
Complexity theory Cryptanalysis Cryptography Cyber Security Encryption Key generation Public key cryptosystem Symmetric key cryptosystem |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNICAMPANIA-VAN0277024 |
Underwood, Robert G.
|
||
| Cham, : Springer, 2022 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||
Cryptography for Secure Encryption / Robert G. Underwood
| Cryptography for Secure Encryption / Robert G. Underwood |
| Autore | Underwood, Robert G. |
| Pubbl/distr/stampa | Cham, : Springer, 2022 |
| Descrizione fisica | xii, 319 p. : ill. ; 24 cm |
| Soggetto topico |
11G07 - Elliptic curves over local fields [MSC 2020]
14G50 - Applications to coding theory and cryptography of algebraic geometry [MSC 2020] 94-XX - Information and communication theory, circuits [MSC 2020] 94A60 - Cryptography [MSC 2020] |
| Soggetto non controllato |
Automatic sequences
Complexity theory Cryptanalysis Cryptography Cyber Security Encryption Key generation Public key cryptosystem Symmetric key cryptosystem |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNICAMPANIA-VAN00277024 |
Underwood, Robert G.
|
||
| Cham, : Springer, 2022 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||
Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Murugia Souppaya, Karen Kent, Paul M. Johnson
| Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Murugia Souppaya, Karen Kent, Paul M. Johnson |
| Autore | Souppaya Murugiah |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 |
| Descrizione fisica | 1 online resource |
| Altri autori (Persone) |
JohnsonPaul M
ScarfoneKaren |
| Collana | NIST special publication |
| Soggetto non controllato |
Anti-virus
Authentication Computer security COTS Encryption Firewall Hardening IPsec Lockdown Malware Microsoft Operating system Security checklist Security configuration Security controls Security policy Security templates Spyware Threats W |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Guidance for securing Microsoft Windows XP for IT Professionals |
| Record Nr. | UNINA-9910711179703321 |
Souppaya Murugiah
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Modern Cryptography, Probabilistic Proofs and Pseudorandomness / Oded Goldreich
| Modern Cryptography, Probabilistic Proofs and Pseudorandomness / Oded Goldreich |
| Autore | Goldreich, Oded |
| Pubbl/distr/stampa | Berlin ; Heidelberg, : Springer, 1999 |
| Descrizione fisica | xvi, 182 p. ; 24 cm |
| Soggetto topico |
03Bxx - General logic [MSC 2020]
60Axx - Foundations of probability theory [MSC 2020] 68-XX - Computer science [MSC 2020] 68Qxx - Theory of computing [MSC 2020] 68Rxx - Discrete mathematics in relation to computer science [MSC 2020] |
| Soggetto non controllato |
Algorithms
Approximations Combinatorics Complexity Complexity theory Cryptography Digital signature Encryption Graphs Matching Networks Probability Theory Random Walks |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNICAMPANIA-VAN00299799 |
Goldreich, Oded
|
||
| Berlin ; Heidelberg, : Springer, 1999 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||
Recommendation for block cipher modes of operation [[electronic resource] ] : the CCM mode for authentication and confidentiality / / Morris Dworkin
| Recommendation for block cipher modes of operation [[electronic resource] ] : the CCM mode for authentication and confidentiality / / Morris Dworkin |
| Autore | Dworkin Morris |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2004] |
| Descrizione fisica | iv, 21 pages : digital, PDF file |
| Altri autori (Persone) | DworkinM. J |
| Collana | NIST special publication ;Computer security |
| Soggetto topico |
Computer security - Standards - United States
Authentication - Standards Data encryption (Computer science) |
| Soggetto non controllato |
Authenticated encryption
Authentication Block cipher Confidentiality Cryptography Encryption Information security Message authentication code Mode of operation |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Recommendation for block cipher modes of operation |
| Record Nr. | UNINA-9910695294003321 |
Dworkin Morris
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2004] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||