72,95 €
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
36 °P sammeln
72,95 €
72,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
36 °P sammeln
Als Download kaufen
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
36 °P sammeln
Jetzt verschenken
72,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
36 °P sammeln
  • Format: PDF

This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.

Produktbeschreibung
This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dr. Ramkumar is an Associate Professor, at the Dept. of CSE, MSU since August 2009.
Rezensionen
From the book reviews:

"Experienced security practitioners and cryptography researchers will benefit from reading this book. ... the book provides a thorough analysis of key distribution and predistribution techniques, alongside pertinent applications. I would recommend this book as an advanced-level resource on symmetric cryptography and its application to diverse application scenarios." (Zubair Baig, Computing Reviews, February, 2015)