Contemporary cryptology : the science of information integrity
Author(s)
Bibliographic Information
Contemporary cryptology : the science of information integrity
IEEE Press, 1991, c1992
- : N.Y.
Available at 24 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
"The Institute of Electrical and Electronics Engineers, Inc., New York."
Includes bibliographical references and index
"IEEE order number: PC0271-7"--T.p. verso
"IEEE order number: PP2717"--T.p. verso (N.Y.)
Description and Table of Contents
Description
Contemporary Cryptology The Science of Information Integrity The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers. Also of Interest Advances in Adaptive Control Edited by Kumpati S.
Narendra, Romeo Ortega, and Peter Dorato Sponsored by the IEEE Control Systems Society With the advent of more and more sophisticated computers, complex control strategies, such as adaptive control, are becoming more prevalent. This volume provides an in-depth review of recent applications reported at major control conferences. Some of these developments are in established areas of adaptive control, while others represent theoretical breakthrough and novel applications. Much of this material does not appear elsewhere or is difficult to access. Of interest to engineers working in process control, flight control, robotics, automobile control, space control applications, manufacturing systems. 1991 ISBN 0-87942-278-5 Order No. PC0272-5 Hardcover 424 pp Information Technology for Command and Control Methods and Tools for Systems Development and Evaluation Edited by Stephen J. Andriole and Stanley M. Halpin Sponsored by the IEEE Systems, Man, and Cybernetics Society The C 2 marketplace is USD40 billion annually. This is the only book to zero in on the process by which C 2 decisions and information system requirements are identified, modeled, and validated.
It provides the essentials for building systems that help allocate resources, make plans, and monitor environments. Leveraging specific tools and techniques to multiple areas of application, global networking, and interactive decision-making support systems, the role of artificial intelligence in drawing inferences and avoiding mistakes, and the uses of user-computer interface technology are just some of the many components of C 2 presented in this book. Of interest to all information systems professionals, computer scientists, human factors professionals, and all command and control personnel. 1991 ISBN 0-87942-270-X Order PC0264-2 Hardcover 584 pp
Table of Contents
- Contemporary Cryptology: A Foreword - G. Simmons
- Contemporary Cryptology: An Introduction - J. Massey
- CRYPTOGRAPHY
- The Data Encryption Standard: Past and Future - M. Smid & D. Branstad
- Stream Ciphers - R. Rueppel
- The First Ten Years of Public Key Cryptology - W. Diffie
- Public Key Cryptography - J. Nechvatal
- A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms - P. van Oorschot
- AUTHENTICATION
- Digital Signatures - C. Mitchell, et al
- A Survey of Information Authentication - G. Simmons
- PROTOCOLS
- Overview of Interactive Proof Systems and Zero-Knowledge - J. Feigenbaum
- An Introduction to Shared Secret and/or Shared Control Schemes and Their Applications - G. Simmons
- CRYPTANALYSIS
- Cryptanalysis: A Survey of Recent Results - E. Brickell & A. Odlyzko
- Protocol Failures in Cryptosystems - J. Moore
- APPLICATIONS
- The Smart Card: A Standardized Security Device Dedicated to Public Cryptology - L. Guillou, et al
- How to Insure That Data Acquired to Verify Treaty Compliance are Trustworthy - G. Simmons
- Index
- Editor's Biography.
by "Nielsen BookData"