HOME > 상세정보

상세정보

Secure communicating systems : design, analysis, and implementation

Secure communicating systems : design, analysis, and implementation (2회 대출)

자료유형
단행본
개인저자
Huth, Michael, 1962-
서명 / 저자사항
Secure communicating systems : design, analysis, and implementation / Michael R.A. Huth.
발행사항
Cambridge ;   New York :   Cambridge University Press,   2001.  
형태사항
x, 283 p. : ill. ; 27 cm.
ISBN
052180731X
서지주기
Includes bibliographical references (p. [271]-273) and index.
일반주제명
Telecommunication -- Security measures.
000 00859pamuu22002534a 4500
001 000000772157
005 20020618104902
008 010227s2001 enka b 001 0 eng
010 ▼a 01025484
015 ▼a GBA1-W6980
020 ▼a 052180731X
040 ▼a DLC ▼c DLC ▼d UKM ▼d C#P ▼d 211009
042 ▼a pcc
049 1 ▼l 121063712 ▼f 과학
050 0 0 ▼a TK5102.85 ▼b .H88 2001
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b H979s
100 1 ▼a Huth, Michael, ▼d 1962-
245 1 0 ▼a Secure communicating systems : ▼b design, analysis, and implementation / ▼c Michael R.A. Huth.
260 ▼a Cambridge ; ▼a New York : ▼b Cambridge University Press, ▼c 2001.
300 ▼a x, 283 p. : ▼b ill. ; ▼c 27 cm.
504 ▼a Includes bibliographical references (p. [271]-273) and index.
650 0 ▼a Telecommunication ▼x Security measures.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 H979s 등록번호 121063712 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.

What every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs.


정보제공 : Aladin

목차

1. Secure communication in modern information societies; 2. Public-key cryptography; 3. Symmetric-key cryptography; 4. Security protocol design and analysis; 5. Optimal public-key encryption with RSA; 6. Secure information-flow analysis.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)