Contemporary cryptology : (Record no. 59514)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04806nam a2201093 i 4500 |
001 - CONTROL NUMBER | |
control field | 5265879 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421114115.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100317t20151992njua ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780470544327 |
-- | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8/2 |
245 00 - TITLE STATEMENT | |
Title | Contemporary cryptology : |
Sub Title | the science of information integrity / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 PDF (xv, 640 pages) : |
500 ## - GENERAL NOTE | |
Remark 1 | "The Institute of Electrical and Electronics Engineers, Inc., New York." |
500 ## - GENERAL NOTE | |
Remark 1 | "IEEE order number: PC0271-7"--T.p. verso. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | The data encryption standard : past and future / Miles E. Smid, Dennis K. Branstad -- Stream ciphers / Rainer A. Rueppel -- The first ten years of public key cryptology / Whitfield Diffie -- Public key cryptography / James Nechvatal -- A comparison of practical public key cryptosystems based on integer factorization and discrete logarithms / |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | How to insure that data acquired to verify treaty compliance are trustworth / G.J. Simmons. |
520 ## - SUMMARY, ETC. | |
Summary, etc | The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Simmons, Gustavus J. |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Piscataway, New Jersey : |
-- | IEEE Press, |
-- | c1992. |
264 #2 - | |
-- | [Piscataqay, New Jersey] : |
-- | IEEE Xplore, |
-- | [1999] |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | electronic |
-- | isbdmedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
588 ## - | |
-- | Description based on PDF viewed 12/21/2015. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Telecommunication systems |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptography. |
695 ## - | |
-- | Aircraft |
695 ## - | |
-- | Algorithm design and analysis |
695 ## - | |
-- | Authentication |
695 ## - | |
-- | Biographies |
695 ## - | |
-- | Chapters |
695 ## - | |
-- | Complexity theory |
695 ## - | |
-- | Computational complexity |
695 ## - | |
-- | Computers |
695 ## - | |
-- | Cryptography |
695 ## - | |
-- | Digital signatures |
695 ## - | |
-- | Elliptic curve cryptography |
695 ## - | |
-- | Encryption |
695 ## - | |
-- | Forgery |
695 ## - | |
-- | Games |
695 ## - | |
-- | Generators |
695 ## - | |
-- | Gold |
695 ## - | |
-- | Indexes |
695 ## - | |
-- | Instruments |
695 ## - | |
-- | Interpolation |
695 ## - | |
-- | Laboratories |
695 ## - | |
-- | Law |
695 ## - | |
-- | Linear systems |
695 ## - | |
-- | Local area networks |
695 ## - | |
-- | Monitoring |
695 ## - | |
-- | NIST |
695 ## - | |
-- | Nonvolatile memory |
695 ## - | |
-- | Nuclear weapons |
695 ## - | |
-- | Parity check codes |
695 ## - | |
-- | Pins |
695 ## - | |
-- | Polynomials |
695 ## - | |
-- | Probabilistic logic |
695 ## - | |
-- | Proposals |
695 ## - | |
-- | Protocols |
695 ## - | |
-- | Public key |
695 ## - | |
-- | Public key cryptography |
695 ## - | |
-- | Radar |
695 ## - | |
-- | Receivers |
695 ## - | |
-- | Registers |
695 ## - | |
-- | Sections |
695 ## - | |
-- | Security |
695 ## - | |
-- | Sensors |
695 ## - | |
-- | Signal processing algorithms |
695 ## - | |
-- | Smart cards |
695 ## - | |
-- | Transmitters |
695 ## - | |
-- | Very large scale integration |
No items available.