Universitätsbibliothek Hagen


Encyclopedia of Cryptography and Security

Zugangsmöglichkeiten - technische HinweiseURL: Ist mit Ihrem Internetzugang nicht verfügbar.

Ihre IP-Adresse:

Der Zugang zu diesem Angebot ist von Rechnern möglich, die sich im Hochschulnetz der FernUni anmelden.
Aufgrund Ihrer IP-Adresse können wir Sie leider nicht authentifizieren. Wenn Sie Angehörige*r der FernUniversität sind, haben Sie verschiedene Möglichkeiten, Zugriff auf das vorliegende Angebot zu erhalten:
Sie benötigen den hochschulweiten Account (Benutzername und Kennwort).
  • Proxy-Server 1:
  • Proxy-Server 2: Hinweise zur Konfiguration
Weitere Informationen

The Second Edition’s editorial board now includes 34 scholars.Representing the work of researchers from over 30 countries, the Encyclopedia is broad in scope, covering everything from authentication and identification to quantum cryptography and web security. The text’s practical style is instructional, yet fosters investigation. Each area presents concepts, designs, and specific implementations. The highly-structured essays in this work include synonyms, a definition and discussion of the topic, bibliographies, and links to related literature.
Extensive cross-references to other entries within the Encyclopedia support efficient, user-friendly searches for immediate access to relevant information.
Key concepts presented in the Encyclopedia of Cryptography and Security include: Authentication and identification; Block ciphers and stream ciphers; Computational issues; Copy protection; Cryptanalysis and security; Cryptographic protocols; Electronic payment and digital certificates; Elliptic curve cryptography; Factorization algorithms and primality tests; Hash functions and MACs; Historical systems; Identity-based cryptography; Implementation aspects for smart cards and standards; Key management; Multiparty computations like voting schemes; Public key cryptography; Quantum cryptography; Secret sharing schemes; Sequences; Web Security. Topics covered: Data Structures, Cryptography and Information Theory; Data Encryption; Coding and Information Theory; Appl.Mathematics/Computational Methods of Engineering; Applications of Mathematics; Complexity. This authoritative reference will be published in two formats: print and online. The online edition features hyperlinks to cross-references, in addition to significant research.



Stand der Daten
2. Edition 2011

Benötigte Programme
Acrobat Reader

Kontakt:  Dora Buró

Letzte Änderung: 12.01.2024