Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more
1. Introduction to Public-Key Cryptography Mathematical Background 2. Algebraic Background 3. Background on p-adic Numbers 4. Background on Curves and Jacobians 5. Varieties Over Special Fields 6. Background on Pairings 7. Background on Weil Descent 8. Cohomological Background on Point Counting Elementary Arithmetic 9. Exponentiation 10. Integer Arithmetic 11. Finite Field A…
Termasuk bibliografi dan indeks. CONTENTS: 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Field Arithmetic 2.1 In…
Part I: Basic Digital Signal Processing Chapter 1 Introduction Chapter 2 Fourier Analysis and Synthesis Chapter 3 z-Transform Chapter 4 Digital Filters Chapter 5 Sampling and Quantisation Part II: Model-Based Signal Processing Chapter 6 Information Theory and Probability Models Chapter 7 Bayesian Inference Chapter 8 Least Square Error, Wiener
A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.