EXEMPLE
Debasish Jena:On Protocols for Information Security Services
- exemplaire signée 2011, ISBN: 3847317016
Livres de poche
[EAN: 9783847317012], Neubuch, [PU: LAP Lambert Academic Publishing Dez 2011], Neuware - Now-a-days, organizations are becoming more and more dependent on their information systems due to… Plus…
[EAN: 9783847317012], Neubuch, [PU: LAP Lambert Academic Publishing Dez 2011], Neuware - Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can t know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described. 136 pp. Englisch<
| | AbeBooks.deBuchWeltWeit Inh. Ludwig Meier e.K., Bergisch Gladbach, Germany [57449362] [Rating: 5 (von 5)] NEW BOOK. Frais d'envoi EUR 10.52 Details... |
(*) Livre non disponible signifie que le livre est actuellement pas disponible à l'une des plates-formes associées nous recherche.
EXEMPLE
Debasish Jena:On Protocols for Information Security Services
- nouveau livre ISBN: 9783847317012
Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital li… Plus…
Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can t know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described. Bücher / Naturwissenschaften, Medizin, Informatik & Technik / Informatik & EDV<
| | Dodax.deNr. 57a0b6382c9bc808f72cc832 Frais d'envoiVersandkosten: 0.0 EUR, Lieferzeit: 5 Tage, DE. (EUR 0.00) Details... |
(*) Livre non disponible signifie que le livre est actuellement pas disponible à l'une des plates-formes associées nous recherche.
Debasish Jena:On Protocols for Information Security Services
- exemplaire signée ISBN: 9783847317012
Livres de poche
Paperback, [PU: LAP LAMBERT Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology en… Plus…
Paperback, [PU: LAP LAMBERT Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can't know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described., Computing: General<
| | BookDepository.comFrais d'envoiVersandkostenfrei. (EUR 0.00) Details... |
(*) Livre non disponible signifie que le livre est actuellement pas disponible à l'une des plates-formes associées nous recherche.
Debasish Jena:On Protocols for Information Security Services
- exemplaire signée ISBN: 9783847317012
Livres de poche
Paperback, [PU: LAP Lambert Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology en… Plus…
Paperback, [PU: LAP Lambert Academic Publishing], Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment. Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. A key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password has been explained. A unique asymmetric cryptosystem for encrypting large messages has been described, which is not only efficient but also secure as compared to other asymmetric cryptosystems.Blind Signature Schemes (BSS) facilitate a requester to obtain signature from a signer on any document, in such a way that the signer can't know anything about the message that is being signed. Four BSS have been described which are based on Elliptic Curve Discrete Logarithm Problem (ECDLP).A remote user authentication scheme based on ECDLP has been described., Computing: General<
| | BookDepository.comFrais d'envoiVersandkostenfrei. (EUR 0.00) Details... |
(*) Livre non disponible signifie que le livre est actuellement pas disponible à l'une des plates-formes associées nous recherche.
Jena, Debasish:On Protocols for Information Security Services Information Security
- nouveau livre 2011, ISBN: 3847317016
Kartoniert / Broschiert, mit Schutzumschlag 11, [PU:LAP LAMBERT Academic Publishing]
| | Achtung-Buecher.deMARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Frais d'envoiVersandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
(*) Livre non disponible signifie que le livre est actuellement pas disponible à l'une des plates-formes associées nous recherche.