0

My Bag

0.00

Download App

Practical Signcryption (Information Security and Cryptography) 4.0%OFF

Practical Signcryption (Information Security and Cryptography)

by Alexander W. Dent, Yuliang Zheng and Moti Yung

  • ISBN

    :  

    9783540894094

  • Publisher

    :  

    Springer

  • Subject

    :  

    Computer Security, Computer Science, Business Applications

  • Binding

    :  

    HARDCOVER

  • Pages

    :  

    292

  • Year

    :  

    2010

15353.0

4.0% OFF

14738.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

(Imported Edition) Estimated Shipping Time : 25-28 Business Days

View Details

Share it on

  • Description

    In todayx2019;s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality x2013; the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the x201C;encrypt-then-signx201D; method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.

Related Items

-

of

  • OFFER

    Optimizing Voice in ATM/IP Mobile Networks

    Juliet Bates

    Starts At

    3948.0

    5561.0

    29% OFF

  • I-Mode Crash Course

    John R. Vacca

    Starts At

    2981.0

  • OFFER

    Internet Architecture: An Introduction to IP Protocols

    Uyless D. Black

    Starts At

    4491.0

    5545.0

    19% OFF

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • OFFER

    Visual C++ Programming

    Yashavant P. Kanetkar

    Starts At

    288.0

    390.0

    26% OFF

  • Integrated Telecommunications Management Solutions

    Graham Chen

    Starts At

    11558.0

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • OFFER

    The Man-eating Leopard of Rudraprayag (Oxford India Paperbacks)

    Jim Corbett

    Starts At

    184.0

    225.0

    18% OFF

  • OFFER

    Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition

    Douglas R. Hofstadter

    Starts At

    813.0

    1099.0

    26% OFF

  • OFFER

    E.Encyclopedia

    JO BOURNE

    Starts At

    662.0

    895.0

    26% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary