Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 154 from your keywords: subject="Science"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. vanJajodia, Sushil

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9781441959058
Collation
xl, 1416 hlm.; 26 cm
Series Title
-
Call Number
R005.803 TIL e
Availability2
Add to basket
MARC DownloadCite
cover
Fault analysis in cryptography
Comment Share
Joye, MarcTunstall, Michael

Contents: - Part I - Introductory Material. - Chap. 1 Side-Channel Analysis and Its Relevance to Fault Attacks. - Part II Fault Analysis in Secret Key Cryptography. - Chap. 2 Attacking Block Ciphers. - Chap. 3 Differential Fault Analysis of DES. - Chap. 4 Differential Fault Analysis of the Advanced Encryption Standard. - Chap. 5 Countermeasures for Symmetric-Key Ciphers. - Chap. 6 On Co…

Edition
-
ISBN/ISSN
9783642296550
Collation
xvi, 354 hlm.; 25.5 cm.
Series Title
-
Call Number
005.82 JOY f
Availability0
Add to basket
MARC DownloadCite
cover
Black-box models of computation in cryptology
Comment Share
Jager, Tibor

Introduction -- Black-Box Models of Computation -- On Black-Box Ring Extraction and Integer Factorization -- Analysis of Cryptographic Assumptions in the Generic Ring Model -- The Generic Composite Residuosity Problem -- Semi-Generic Groups and Their Applications.

Edition
-
ISBN/ISSN
9783834819895
Collation
xii, 86 hlm.; 26 hlm.
Series Title
-
Call Number
005.82 JAG b
Availability2
Add to basket
MARC DownloadCite
cover
Cryptographic protocol: security analysis based on trusted freshness
Comment Share
Kefei, ChenLing, Dong

Contents: - Introduction of Cryptographic Protocol. - Informal Analysis. - Informal Analysis of Cryptographic Protocols. - Formal Approaches to Security Definition. - Formal Approaches to Security Establishment of Authentication Protocols. - Belief Multisets to Security Establishment of Authentication Protocols. - Automation Approaches to Security Establishment of Authentication Protoc…

Edition
-
ISBN/ISSN
9787040313314
Collation
xi, 373 hlm.; 24 cm.
Series Title
Information Security
Call Number
005.82 LIN c
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cryptography with mathematical foundations and computer imple…
Comment Share
Rosen, Kenneth HStanoyevitch, Alexander

Content: An overview of the subject Divisibility and modular arithmetic The evolution of codemaking until the computer era Matrices and the Hill cryptosystem The evolution of codebreaking until the computer era Representation and arithmetic of integers in different bases Block cryptosystems and the data encryption standard (DES) Some number theory and algorithms Public key cry…

Edition
-
ISBN/ISSN
978-1439817636
Collation
xix, 649 hlm.; 26 cm.
Series Title
Discrete mathematics and its applications
Call Number
005.82 STA i
Availability1
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9780387234731
Collation
xi, 684 hlm.; 28 cm.
Series Title
-
Call Number
R005.803 TIL e
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Fifth Edition
ISBN/ISSN
9780136097044
Collation
xxiii, 743 hlm.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability2
Add to basket
MARC DownloadCite
cover
Practical Signcryption
Comment Share
Dent, Alexander W.Zheng, Yuliang

Table of contents : Introduction Security for Signcryption: The Two-User Model Security for Signcryption: The Multi-User Model Signcryption Schemes Based on the Diffie–Hellman Problem Signcryption Schemes Based on Bilinear Maps Signcryption Schemes Based on the RSA Problem Hybrid Signcryption Concealment and Its Applications to Authenticated Encryption Parallel Signcryption Identit…

Edition
-
ISBN/ISSN
9783540894094
Collation
xviii, 274 hlm.; 26 cm.
Series Title
-
Call Number
005.82 DEN p
Availability1
Add to basket
MARC DownloadCite
cover
Internet cryptography
Comment Share
Smith, Richard E.

CONTENTS: 1. Introduction - The Basic Problem. - Essentials of Crypto. - Crypto Is Hard to Use. - Balancing Crypto Use with Your Objectives. - Essentials of Networking and the Internet. - Protocol Layers and Network Products. - Internet Technology. - Internet Protocols in Your Host. - The Internet Security Problem. - An Internet Rogue's Gallery. - Setting Realistic Security Objecti…

Edition
-
ISBN/ISSN
201924803
Collation
xx, 356 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.8 SMI i
Availability4
Add to basket
MARC DownloadCite
cover
Cryptography: protocols, design, and applications
Comment Share
Lek, KamolRajapakse, Naruemol

Preface Quantum Cryptographic Protocols and Quantum Security (Laszlo Gyongyosi, Sandor Imre, Department of Telecommunications, Budapest University of Technology and Economics, Budapest, Hungary) Low-Cost Mutual Authentication Protocols (Mu’awya Naser, Pedro Peris-Lopez, Mohammad Rafie, Rahmat Budiarto, School of Computer Sciences, Unvirisity Sinas Malaysia, Pinang, Malaysia, and other…

Edition
-
ISBN/ISSN
9781621007791
Collation
ix, 242 hlm.; 26 cm.
Series Title
Crytography, Steganography and Data Security
Call Number
005.82 LEK c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?