• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Functional Encryption » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Functional Encryption

ISBN-13: 9783030608927 / Angielski / Miękka / 2022

Functional Encryption  9783030608927 Springer International Publishing - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Functional Encryption

ISBN-13: 9783030608927 / Angielski / Miękka / 2022

cena 403,47 zł
(netto: 384,26 VAT:  5%)

Najniższa cena z 30 dni: 385,52 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures.

  • Explains the latest functional encryption algorithms in a simple way with examples;
  • Includes applications of functional encryption in information security, application security, and network security;
  • Relevant to academics, research scholars, software developers, etc.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Telecommunications
Computers > Information Theory
Mathematics > Matematyka stosowana
Wydawca:
Springer International Publishing
Seria wydawnicza:
EAI/Springer Innovations in Communication and Computing
Język:
Angielski
ISBN-13:
9783030608927
Rok wydania:
2022
Waga:
0.49 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Introduction.-  Foundations of Functional Encryption.- Mathematical Concepts and Properties.- Elliptic Curve Cryptography.- XTR Algorithm: Efficient and Compact Subgroup Trace Representation.- HECC: Hyperelliptic Curve Cryptography.- Pairing-Based Cryptography.- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units.- Cocks IBE Scheme.- Boneh-Franklin IBE.- Boneh-Boyen IBE.- Sakai-Kasahara IBE.- Hierarchical IBE.- Extensions of IBE and Related Primitives.- Attribute Based Encryption.- Digital Signatures.- Applications of Functional Encryption.- IRON: Functional Encryption Using Intel SGX .- Conclusion.


Dr. Khairol Amali bin Ahmad obtained a BSc in Electrical Engineering in 1992 from the United States Military Academy, West Point and an MSc in Military Electronic Systems Engineering in 1999 from Cranfield University. While serving in the Malaysian Army, he was positioned in various posts and units including those dealing with engineering maintenance and procurement consultation of equipment. He then joined the National Defence University of Malaysia (NDUM) and completed his PhD from ISAE-SUPAERO, France in 2015. Currently, he is the Dean of the Engineering Faculty and an associate to Centre for Tropicalization (CENTROP) and Centre of Defence Research and Technology (CODRAT) in NDUM. He serves as a Vice Chairman of Malaysia Radar and Navigation Interest Group (MyRANig) of MySET. He is also a member of the Institution of Engineering and Technology (IET), Board of Engineer Malaysia (BEM) and Malaysia Board of Technologists (MBOT). He has served as Organizing Chair of several international conferences such as DSTC2016 and IntCET2017. He has also delivered an expert talk, guest lecturers in the conference and serving as a reviewer for several conferences and journals. Among his current research interests include signal processing related to signal propagation in Tropical area, mesh networks for IoT applications and Delay\Disruption Tolerant Network (DTN).  He is also serving as Guest Editor of International Journal of Innovative Computing and Applications (InderScience), Journal of Recent Patents on Engineering, Bentham Science and Scalable Computing: Practice and Experience (SCPE).

Dr. Khaleel Ahmad is currently an Assistant Professor in the School of Computer Science & Information Technology at Maulana Azad National Urdu University, Hyderabad. He has visited the National Defence University of Malaysia, Malaysia as a visiting faculty. He holds a PhD in Computer Science & Engineering and M.Tech in Information Security. His research area is Cyber Security, Cryptography, Blockchain Technology and Opportunistic Network. He has 30 published papers in refereed national/international journals and conferences (viz. Elsevier, ACM, IEEE, and Springer), 10 book chapters (CRC Press, IGI Global, IGI Global, Wiley). He has also edited two books for Taylor & Francis titled “Opportunistic Networks: Mobility Models, Protocols, Security & Privacy” and “Emerging Security Algorithms and Techniques”. In addition, He has also organized special sessions in many International Conferences viz. IEEE GCCE 2016 Japan, IEEE GCCE 2017 Japan. He has completed successfully project of Rs. 1Lakhs and Five Thousand (INR). He has supervised 4 M.Tech and 3 PhD under progress. He has delivered guest lectures at the Central University of Haryana, India and Telangana University, India and also chaired the session at an international conference in Hyderabad. He is also serving as Guest Editor of International Journal of Innovative Computing and Applications (InderScience), Journal of Recent Patents on Engineering, Bentham Science and Scalable Computing: Practice and Experience (SCPE). He is also the life member of various international/national research societies viz. ISTE, CRSI, ISCA, IACSIT (Singapore), IAENG (Hong Kong), IARCS, IAOE (Austria), ISOC (USA) etc. In addition, he is associated with many international research organizations as editorial board member and reviewer.

Dr. Uma N. Dulhare is currently working as a Professor in Department of Computer Science & Engg, MuffaKham Jah College of Engineering, Banjara Hills, Hyderabad. She has more than 20 years teaching experience. She received her Ph.D from Osmania University, Hyderabad Her research interest includes Data Mining, Big Data Analytics and Machine Learning, IOT, Cloud computing, Biomedical Image Processing. She has published more than 30 research papers in reputed National & International Journals & as a book chapter. She is a Member of Computer Science Teachers Association (CSTA), USA, Senior Member of International Association of Engineers (IAENG), Senior member of Universal Association of Computer and Electronics Engineers (UACEE) Life Member of ISTE. She is a member of editorial board for various National and International journals in the field of Computer Science and program committee member/reviewer for various International conferences. She is also a pride recipient of Best Computer Science Faculty, Best Academic Researcher, Teaching & Research Excellence, Outstanding Educator & Scholar award.

This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking.

  • Explains the latest functional encryption algorithms in a simple way with examples;
  • Includes applications of functional encryption in information security, application security, and network security;
  • Relevant to academics, research scholars, software developers, etc.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia