Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 88 from your keywords: subject="Encryption"
First Page Previous 6 7 8 9 Next Last Page
cover
Cryptographic protocol: security analysis based on trusted freshness
Comment Share
Kefei, ChenLing, Dong

Contents: - Introduction of Cryptographic Protocol. - Informal Analysis. - Informal Analysis of Cryptographic Protocols. - Formal Approaches to Security Definition. - Formal Approaches to Security Establishment of Authentication Protocols. - Belief Multisets to Security Establishment of Authentication Protocols. - Automation Approaches to Security Establishment of Authentication Protoc…

Edition
-
ISBN/ISSN
9787040313314
Collation
xi, 373 hlm.; 24 cm.
Series Title
Information Security
Call Number
005.82 LIN c
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cryptography with mathematical foundations and computer imple…
Comment Share
Rosen, Kenneth HStanoyevitch, Alexander

Content: An overview of the subject Divisibility and modular arithmetic The evolution of codemaking until the computer era Matrices and the Hill cryptosystem The evolution of codebreaking until the computer era Representation and arithmetic of integers in different bases Block cryptosystems and the data encryption standard (DES) Some number theory and algorithms Public key cry…

Edition
-
ISBN/ISSN
978-1439817636
Collation
xix, 649 hlm.; 26 cm.
Series Title
Discrete mathematics and its applications
Call Number
005.82 STA i
Availability1
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9780387234731
Collation
xi, 684 hlm.; 28 cm.
Series Title
-
Call Number
R005.803 TIL e
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Fifth Edition
ISBN/ISSN
9780136097044
Collation
xxiii, 743 hlm.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability2
Add to basket
MARC DownloadCite
cover
Practical Signcryption
Comment Share
Dent, Alexander W.Zheng, Yuliang

Table of contents : Introduction Security for Signcryption: The Two-User Model Security for Signcryption: The Multi-User Model Signcryption Schemes Based on the Diffie–Hellman Problem Signcryption Schemes Based on Bilinear Maps Signcryption Schemes Based on the RSA Problem Hybrid Signcryption Concealment and Its Applications to Authenticated Encryption Parallel Signcryption Identit…

Edition
-
ISBN/ISSN
9783540894094
Collation
xviii, 274 hlm.; 26 cm.
Series Title
-
Call Number
005.82 DEN p
Availability1
Add to basket
MARC DownloadCite
cover
Internet cryptography
Comment Share
Smith, Richard E.

CONTENTS: 1. Introduction - The Basic Problem. - Essentials of Crypto. - Crypto Is Hard to Use. - Balancing Crypto Use with Your Objectives. - Essentials of Networking and the Internet. - Protocol Layers and Network Products. - Internet Technology. - Internet Protocols in Your Host. - The Internet Security Problem. - An Internet Rogue's Gallery. - Setting Realistic Security Objecti…

Edition
-
ISBN/ISSN
201924803
Collation
xx, 356 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.8 SMI i
Availability4
Add to basket
MARC DownloadCite
cover
Cryptography: protocols, design, and applications
Comment Share
Lek, KamolRajapakse, Naruemol

Preface Quantum Cryptographic Protocols and Quantum Security (Laszlo Gyongyosi, Sandor Imre, Department of Telecommunications, Budapest University of Technology and Economics, Budapest, Hungary) Low-Cost Mutual Authentication Protocols (Mu’awya Naser, Pedro Peris-Lopez, Mohammad Rafie, Rahmat Budiarto, School of Computer Sciences, Unvirisity Sinas Malaysia, Pinang, Malaysia, and other…

Edition
-
ISBN/ISSN
9781621007791
Collation
ix, 242 hlm.; 26 cm.
Series Title
Crytography, Steganography and Data Security
Call Number
005.82 LEK c
Availability1
Add to basket
MARC DownloadCite
cover
Multimedia content encryption: techniques and applications
Comment Share
Lian, Shiguo

Content list: Chapter 1 Introduction 1.1 Background 1.2 Definition 1.3 History 1.4 Classification 1.5 Book Organization Chapter 2 Performance Requirement of Multimedia Content Encryption 2.1 Introduction 2.2 Security Requirement 2.3 Compression Efficiency 2.4 Encryption Efficiency 2.5 Format Compliance 2.6 Application Suitability Chapter 3 Fundamental Techniques 3.1…

Edition
-
ISBN/ISSN
9781420065275
Collation
xvii, 217 hlm.; 24 cm.
Series Title
-
Call Number
005.82 LIA m
Availability1
Add to basket
MARC DownloadCite
cover
Contemporary cryptology: the science of information integrity
Comment Share
Simmons, Gustavus J.

Edition
-
ISBN/ISSN
780353528
Collation
xv, 640 hlm.; 23 cm.
Series Title
-
Call Number
005.82 SIM c

Edition
-
ISBN/ISSN
780353528
Collation
xv, 640 hlm.; 23 cm.
Series Title
-
Call Number
005.82 SIM c
Availability2
Add to basket
MARC DownloadCite
cover
Image and video encryption: from digital rights management to secured persona…
Comment Share
Pommer, AndreasUhl, Andreas

Edition
-
ISBN/ISSN
387234039
Collation
xvi, 161 hlm.; 25 cm.
Series Title
Advances in information security
Call Number
005.82 UHL i

Edition
-
ISBN/ISSN
387234039
Collation
xvi, 161 hlm.; 25 cm.
Series Title
Advances in information security
Call Number
005.82 UHL i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?