Secure communicating systems: design, analysis, and implementation
More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cambridge
Cambridge University Press
2001
|
Links: | https://doi.org/10.1017/CBO9781139164870 |
Zusammenfassung: | More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented. |
Umfang: | 1 Online-Ressource (x, 283 Seiten) |
ISBN: | 9781139164870 |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-20-CTM-CR9781139164870 | ||
003 | UkCbUP | ||
005 | 20151005020622.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr|||||||||||| | ||
008 | 141103s2001||||enk o ||1 0|eng|d | ||
020 | |a 9781139164870 | ||
100 | 1 | |a Huth, Michael |d 1962- | |
245 | 1 | 0 | |a Secure communicating systems |b design, analysis, and implementation |c Michael R A Huth |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2001 | |
300 | |a 1 Online-Ressource (x, 283 Seiten) | ||
336 | |b txt | ||
337 | |b c | ||
338 | |b cr | ||
520 | |a More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented. | ||
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780521001885 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780521807319 |
966 | 4 | 0 | |l DE-91 |p ZDB-20-CTM |q TUM_PDA_CTM |u https://doi.org/10.1017/CBO9781139164870 |3 Volltext |
912 | |a ZDB-20-CTM | ||
912 | |a ZDB-20-CTM | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-20-CTM-CR9781139164870 |
---|---|
_version_ | 1825574051132735488 |
adam_text | |
any_adam_object | |
author | Huth, Michael 1962- |
author_facet | Huth, Michael 1962- |
author_role | |
author_sort | Huth, Michael 1962- |
author_variant | m h mh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-20-CTM |
format | eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02008nam a2200253 i 4500</leader><controlfield tag="001">ZDB-20-CTM-CR9781139164870</controlfield><controlfield tag="003">UkCbUP</controlfield><controlfield tag="005">20151005020622.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr||||||||||||</controlfield><controlfield tag="008">141103s2001||||enk o ||1 0|eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139164870</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Huth, Michael</subfield><subfield code="d">1962-</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure communicating systems</subfield><subfield code="b">design, analysis, and implementation</subfield><subfield code="c">Michael R A Huth</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 283 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780521001885</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780521807319</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-20-CTM</subfield><subfield code="q">TUM_PDA_CTM</subfield><subfield code="u">https://doi.org/10.1017/CBO9781139164870</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CTM</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CTM</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-20-CTM-CR9781139164870 |
illustrated | Not Illustrated |
indexdate | 2025-03-03T11:58:05Z |
institution | BVB |
isbn | 9781139164870 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (x, 283 Seiten) |
psigel | ZDB-20-CTM TUM_PDA_CTM ZDB-20-CTM |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Huth, Michael 1962- Secure communicating systems design, analysis, and implementation Michael R A Huth Cambridge Cambridge University Press 2001 1 Online-Ressource (x, 283 Seiten) txt c cr More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented. Erscheint auch als Druck-Ausgabe 9780521001885 Erscheint auch als Druck-Ausgabe 9780521807319 |
spellingShingle | Huth, Michael 1962- Secure communicating systems design, analysis, and implementation |
title | Secure communicating systems design, analysis, and implementation |
title_auth | Secure communicating systems design, analysis, and implementation |
title_exact_search | Secure communicating systems design, analysis, and implementation |
title_full | Secure communicating systems design, analysis, and implementation Michael R A Huth |
title_fullStr | Secure communicating systems design, analysis, and implementation Michael R A Huth |
title_full_unstemmed | Secure communicating systems design, analysis, and implementation Michael R A Huth |
title_short | Secure communicating systems |
title_sort | secure communicating systems design analysis and implementation |
title_sub | design, analysis, and implementation |
work_keys_str_mv | AT huthmichael securecommunicatingsystemsdesignanalysisandimplementation |