Contemporary Cryptology: The Science Of Information Integrity


  • 出版商: Wiley
  • 出版日期: 1999-02-10
  • 售價: $6,370
  • 貴賓價: 9.5$6,052
  • 語言: 英文
  • 頁數: 656
  • 裝訂: Paperback
  • ISBN: 0780353528
  • ISBN-13: 9780780353527
  • 海外代購書籍(需單獨結帳)
    無現貨庫存(No stock available)




Contemporary Cryptology The Science of Information Integrity The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers. Also of Interest Advances in Adaptive Control Edited by Kumpati S. Narendra, Romeo Ortega, and Peter Dorato Sponsored by the IEEE Control Systems Society With the advent of more and more sophisticated computers, complex control strategies, such as adaptive control, are becoming more prevalent. This volume provides an in-depth review of recent applications reported at major control conferences. Some of these developments are in established areas of adaptive control, while others represent theoretical breakthrough and novel applications. Much of this material does not appear elsewhere or is difficult to access. Of interest to engineers working in process control, flight control, robotics, automobile control, space control applications, manufacturing systems. 1991 ISBN 0-87942-278-5 Order # PC0272-5 Hardcover 424 pp Information Technology for Command and Control Methods and Tools for Systems Development and Evaluation Edited by Stephen J. Andriole and Stanley M. Halpin Sponsored by the IEEE Systems, Man, and Cybernetics Society The C2 marketplace is $40 billion annually. This is the only book to zero in on the process by which C2 decisions and information system requirements are identified, modeled, and validated. It provides the essentials for building systems that help allocate resources, make plans, and monitor environments. Leveraging specific tools and techniques to multiple areas of application, global networking, and interactive decision-making support systems, the role of artificial intelligence in drawing inferences and avoiding mistakes, and the uses of user-computer interface technology are just some of the many components of C2 presented in this book. Of interest to all information systems professionals, computer scientists, human factors professionals, and all command and control personnel. 1991 ISBN 0-87942-270-X Order # PC0264-2 Hardcover 584 pp


Table of Contents:

Contemporary Cryptology: A Foreword (G. Simmons).

Contemporary Cryptology: An Introduction (J. Massey).


The Data Encryption Standard: Past and Future (M. Smid & D. Branstad).

Stream Ciphers (R. Rueppel).

The First Ten Years of Public Key Cryptology (W. Diffie).

Public Key Cryptography (J. Nechvatal).

A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms (P. van Oorschot).


Digital Signatures (C. Mitchell, et al.).

A Survey of Information Authentication (G. Simmons).


Overview of Interactive Proof Systems and Zero-Knowledge (J. Feigenbaum).

An Introduction to Shared Secret and/or Shared Control Schemes and Their Applications (G. Simmons)


Cryptanalysis: A Survey of Recent Results (E. Brickell & A. Odlyzko).

Protocol Failures in Cryptosystems (J. Moore).


The Smart Card: A Standardized Security Device Dedicated to Public Cryptology (L. Guillou, et al.)

How to Insure That Data Acquired to Verify Treaty Compliance are Trustworthy (G. Simmons).


Editor's Biography.