Publication year: 2007
ISBN: 978-3-540-72738-5
Internet Resource: Please Login to download book
The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, security in wireless, ad-hoc, and peer-to-peer networks, as well as efficient implementation.
Subject: Computer Science, AES, Firewall, PKC, PKI, Signcryption, complexity, cryptanalysis, cryptographic attacks, cryptography, key management, multi-party encryption, network security, networks, privacy, signature