Contemporary Cryptology: The Science Of Information Integrity
暫譯: 當代密碼學:資訊完整性的科學

Simmons

  • 出版商: Wiley
  • 出版日期: 1999-02-10
  • 售價: $6,630
  • 貴賓價: 9.5$6,299
  • 語言: 英文
  • 頁數: 656
  • 裝訂: Paperback
  • ISBN: 0780353528
  • ISBN-13: 9780780353527
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

相關主題

商品描述

Description:

Contemporary Cryptology The Science of Information Integrity The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers. Also of Interest Advances in Adaptive Control Edited by Kumpati S. Narendra, Romeo Ortega, and Peter Dorato Sponsored by the IEEE Control Systems Society With the advent of more and more sophisticated computers, complex control strategies, such as adaptive control, are becoming more prevalent. This volume provides an in-depth review of recent applications reported at major control conferences. Some of these developments are in established areas of adaptive control, while others represent theoretical breakthrough and novel applications. Much of this material does not appear elsewhere or is difficult to access. Of interest to engineers working in process control, flight control, robotics, automobile control, space control applications, manufacturing systems. 1991 ISBN 0-87942-278-5 Order # PC0272-5 Hardcover 424 pp Information Technology for Command and Control Methods and Tools for Systems Development and Evaluation Edited by Stephen J. Andriole and Stanley M. Halpin Sponsored by the IEEE Systems, Man, and Cybernetics Society The C2 marketplace is $40 billion annually. This is the only book to zero in on the process by which C2 decisions and information system requirements are identified, modeled, and validated. It provides the essentials for building systems that help allocate resources, make plans, and monitor environments. Leveraging specific tools and techniques to multiple areas of application, global networking, and interactive decision-making support systems, the role of artificial intelligence in drawing inferences and avoiding mistakes, and the uses of user-computer interface technology are just some of the many components of C2 presented in this book. Of interest to all information systems professionals, computer scientists, human factors professionals, and all command and control personnel. 1991 ISBN 0-87942-270-X Order # PC0264-2 Hardcover 584 pp

 

Table of Contents:

Contemporary Cryptology: A Foreword (G. Simmons).

Contemporary Cryptology: An Introduction (J. Massey).

CRYPTOGRAPHY.

The Data Encryption Standard: Past and Future (M. Smid & D. Branstad).

Stream Ciphers (R. Rueppel).

The First Ten Years of Public Key Cryptology (W. Diffie).

Public Key Cryptography (J. Nechvatal).

A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms (P. van Oorschot).

AUTHENTICATION.

Digital Signatures (C. Mitchell, et al.).

A Survey of Information Authentication (G. Simmons).

PROTOCOLS.

Overview of Interactive Proof Systems and Zero-Knowledge (J. Feigenbaum).

An Introduction to Shared Secret and/or Shared Control Schemes and Their Applications (G. Simmons)

CRYPTANALYSIS.

Cryptanalysis: A Survey of Recent Results (E. Brickell & A. Odlyzko).

Protocol Failures in Cryptosystems (J. Moore).

APPLICATIONS.

The Smart Card: A Standardized Security Device Dedicated to Public Cryptology (L. Guillou, et al.)

How to Insure That Data Acquired to Verify Treaty Compliance are Trustworthy (G. Simmons).

Index.

Editor's Biography.

商品描述(中文翻譯)

**描述:**
當代密碼學 資訊完整性的科學 在過去十年中,密碼學領域經歷了前所未有的發展,本書的貢獻者一直處於這些發展的最前沿。在一個資訊密集的社會中,必須設計出僅用資訊就能完成過去依賴文件、個人控制和法律協議(保密、簽名、見證、日期、收據和/或來源的認證)所能達成的每一功能的方法。本書專注於這些需求,涵蓋資訊完整性科學的各個方面,特別強調該主題的密碼學元素。除了作為一本入門指南和最新發展的綜述外,本書還為工程師和科學家提供了算法、協議和應用。對計算機科學家、通信工程師、數據管理專家、密碼學家、數學家、安全專家和網絡工程師均有興趣。

**進階自適應控制**
編輯:Kumpati S. Narendra、Romeo Ortega 和 Peter Dorato
贊助:IEEE 控制系統學會
隨著越來越多的複雜計算機的出現,複雜的控制策略,如自適應控制,變得越來越普遍。本卷提供了在主要控制會議上報告的近期應用的深入回顧。其中一些發展是在自適應控制的既定領域,而其他則代表了理論突破和新穎應用。這些材料在其他地方不常見或難以獲得。對於從事過程控制、飛行控制、機器人技術、汽車控制、空間控制應用和製造系統的工程師均有興趣。

**指揮與控制的信息技術**
系統開發和評估的方法與工具