語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Functional Encryption
~
Ahmad, Khairol Amali Bin.
Functional Encryption
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Functional Encryption/ edited by Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare.
其他作者:
Dulhare, Uma N.
面頁冊數:
X, 309 p. 84 illus., 18 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Applications of Mathematics. -
電子資源:
https://doi.org/10.1007/978-3-030-60890-3
ISBN:
9783030608903
Functional Encryption
Functional Encryption
[electronic resource] /edited by Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare. - 1st ed. 2021. - X, 309 p. 84 illus., 18 illus. in color.online resource. - EAI/Springer Innovations in Communication and Computing,2522-8609. - EAI/Springer Innovations in Communication and Computing,.
Introduction -- Foundations of Functional Encryption -- Mathematical Concepts and Properties -- Elliptic Curve Cryptography -- XTR Algorithm: Efficient and Compact Subgroup Trace Representation -- HECC: Hyperelliptic Curve Cryptography -- Pairing-Based Cryptography -- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units -- Cocks IBE Scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchical IBE -- Extensions of IBE and Related Primitives -- Attribute Based Encryption -- Digital Signatures -- Applications of Functional Encryption -- IRON: Functional Encryption Using Intel SGX -- Conclusion.
This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
ISBN: 9783030608903
Standard No.: 10.1007/978-3-030-60890-3doiSubjects--Topical Terms:
669175
Applications of Mathematics.
LC Class. No.: TK1-9971
Dewey Class. No.: 621.382
Functional Encryption
LDR
:02770nam a22004095i 4500
001
1055440
003
DE-He213
005
20211115204447.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030608903
$9
978-3-030-60890-3
024
7
$a
10.1007/978-3-030-60890-3
$2
doi
035
$a
978-3-030-60890-3
050
4
$a
TK1-9971
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
621.382
$2
23
245
1 0
$a
Functional Encryption
$h
[electronic resource] /
$c
edited by Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
X, 309 p. 84 illus., 18 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
EAI/Springer Innovations in Communication and Computing,
$x
2522-8609
505
0
$a
Introduction -- Foundations of Functional Encryption -- Mathematical Concepts and Properties -- Elliptic Curve Cryptography -- XTR Algorithm: Efficient and Compact Subgroup Trace Representation -- HECC: Hyperelliptic Curve Cryptography -- Pairing-Based Cryptography -- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units -- Cocks IBE Scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchical IBE -- Extensions of IBE and Related Primitives -- Attribute Based Encryption -- Digital Signatures -- Applications of Functional Encryption -- IRON: Functional Encryption Using Intel SGX -- Conclusion.
520
$a
This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
650
2 4
$a
Applications of Mathematics.
$3
669175
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
0
$a
Engineering mathematics.
$3
562757
650
0
$a
Applied mathematics.
$3
1069907
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Electrical engineering.
$3
596380
700
1
$a
Dulhare, Uma N.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1360629
700
1
$a
Ahmad, Khaleel.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1360628
700
1
$a
Ahmad, Khairol Amali Bin.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1360627
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030608897
776
0 8
$i
Printed edition:
$z
9783030608910
776
0 8
$i
Printed edition:
$z
9783030608927
830
0
$a
EAI/Springer Innovations in Communication and Computing,
$x
2522-8595
$3
1288259
856
4 0
$u
https://doi.org/10.1007/978-3-030-60890-3
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入