Buch, Englisch, 234 Seiten, HC runder Rücken kaschiert, Format (B × H): 160 mm x 241 mm, Gewicht: 5029 g
Buch, Englisch, 234 Seiten, HC runder Rücken kaschiert, Format (B × H): 160 mm x 241 mm, Gewicht: 5029 g
ISBN: 978-3-319-07583-9
Verlag: Springer International Publishing
This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Introduction.- Some Useful Constructions.- Non-scalable Key Distribution Schemes.- MLS for Internet Security Protocols.- Scalable Key Distribution Schemes.- Scalable Extensions of Non-scalable Schemes.- Using PKPSs With Tamper-Responsive Modules.- Broadcast Authentication and Broadcast Encryption.- Authenticated Data Structures.- Universal Trusted Computing Bases.- Conclusions and References.