Contents Basic Mathematical Concepts and Properties Properties of Elliptic Curves Divisors and the Tate Pairing Cryptography and Computational Complexity Related Cryptographic Algorithms The Cocks IBE Scheme Boneh-Franklin IBE Boneh-Boyen IBE Sakai-Kasahara IBE Hierarchical IBE and Master Secret Sharing Calculating Pairings
CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…
Machine generated contents note: pt. I Setting the Scene 1.Basic Principles 1.1.Why Information security? 1.2.Security risks 1.3.Security services 1.4.Fundamentals of cryptosystems 1.5.Cryptosystem security assumptions 1.6.Breaking cryptosystems 1.7.Summary 1.8.Further reading 1.9.Activities 2.Historical Cryptosystems 2.1.Monoalphabetic ciphers 2.2.Historical advance…
Jilid 1. Judul asli: Decision support systems and intelligent systems Termasuk bibliografi dan indeks. DAFTAR ISI: 1. Sistem pendukung manajemen: sebuah tinjauan 2. Sistem pengambilan keputusan, pemodelan dan pendukung 3. Sistem pendukung keputusan: Sebuah tinjauan 4. Pemodelan dan analisis 5. Kecerdasan bisnis: data warehousing, akuisisi data, data mining, analitik bi…
Jilid 2. Judul asli: Decision support systems and intelligent systems Termasuk bibliografi dan indeks. DAFTAR ISI: 10. Kecerdasan tiruan dan sistem pakar: sistem berbasis-aturan 11. Akuisisi, representasi, dan pertimbangan pengetahuan 12. Sistem cerdas lanjutan 13. Sistem cerdas pada internet 14. Electronic commerce 15. Integrasi, pengaruh, dan masa depan sistem p…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …