[EAN: 9783847317012], Neubuch, [PU: LAP Lambert Academic Publishing Dez 2011], Neuware - Now-a-days, organizations are becoming more and more dependent on their information systems due to… mais…
[EAN: 9783847317012], Neubuch, [PU: LAP Lambert Academic Publishing Dez 2011], Neuware - Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can t know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described. 136 pp. Englisch<
AbeBooks.de
BuchWeltWeit Inh. Ludwig Meier e.K., Bergisch Gladbach, Germany [57449362] [Rating: 5 (von 5)] NEW BOOK. Custos de envio: EUR 10.52 Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital li… mais…
Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can t know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described. Bücher / Naturwissenschaften, Medizin, Informatik & Technik / Informatik & EDV<
Dodax.de
Nr. 57a0b6382c9bc808f72cc832 Custos de envio:Versandkosten: 0.0 EUR, Lieferzeit: 5 Tage, DE. (EUR 0.00) Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
Paperback, [PU: LAP LAMBERT Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology en… mais…
Paperback, [PU: LAP LAMBERT Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can't know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described., Computing: General<
BookDepository.com
Custos de envio:Versandkostenfrei. (EUR 0.00) Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
Paperback, [PU: LAP Lambert Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology en… mais…
Paperback, [PU: LAP Lambert Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can't know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described., Computing: General<
BookDepository.com
Custos de envio:Versandkostenfrei. (EUR 0.00) Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
[EAN: 9783847317012], Neubuch, [PU: LAP Lambert Academic Publishing Dez 2011], Neuware - Now-a-days, organizations are becoming more and more dependent on their information systems due to… mais…
[EAN: 9783847317012], Neubuch, [PU: LAP Lambert Academic Publishing Dez 2011], Neuware - Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can t know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described. 136 pp. Englisch<
NEW BOOK. Custos de envio: EUR 10.52 BuchWeltWeit Inh. Ludwig Meier e.K., Bergisch Gladbach, Germany [57449362] [Rating: 5 (von 5)]
Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital li… mais…
Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can t know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described. Bücher / Naturwissenschaften, Medizin, Informatik & Technik / Informatik & EDV<
- Nr. 57a0b6382c9bc808f72cc832 Custos de envio:Versandkosten: 0.0 EUR, Lieferzeit: 5 Tage, DE. (EUR 0.00)
Paperback, [PU: LAP LAMBERT Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology en… mais…
Paperback, [PU: LAP LAMBERT Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can't know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described., Computing: General<
Paperback, [PU: LAP Lambert Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology en… mais…
Paperback, [PU: LAP Lambert Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can't know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described., Computing: General<
1Como algumas plataformas não transmitem condições de envio e estas podem depender do país de entrega, do preço de compra, do peso e tamanho do artigo, de uma possível adesão à plataforma, de uma entrega directa pela plataforma ou através de um terceiro fornecedor (Marketplace), etc., é possível que os custos de envio indicados pelo eurolivro não correspondam aos da plataforma ofertante.
Dados bibliográficos do melhor livro correspondente
Dados detalhados do livro - On Protocols for Information Security Services
EAN (ISBN-13): 9783847317012 ISBN (ISBN-10): 3847317016 Livro de capa dura Livro de bolso Ano de publicação: 2011 Editor/Editora: LAP Lambert Academic Publishing
Livro na base de dados desde 2009-06-08T08:49:25+01:00 (Lisbon) Página de detalhes modificada pela última vez em 2022-11-06T09:02:30+00:00 (Lisbon) Número ISBN/EAN: 3847317016
Número ISBN - Ortografia alternativa: 3-8473-1701-6, 978-3-8473-1701-2 Ortografia alternativa e termos de pesquisa relacionados: Autor do livro: jena