A cryptography primer: secrets and promises
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible intr...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2014
|
Schlagworte: | |
Online-Zugang: | BSB01 FHN01 UBY01 UPA01 URL des Erstveröffentlichers |
Zusammenfassung: | Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 online resource (xiii, 174 pages) |
ISBN: | 9781139084772 |
DOI: | 10.1017/CBO9781139084772 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043944052 | ||
003 | DE-604 | ||
005 | 20230711 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781139084772 |c Online |9 978-1-139-08477-2 | ||
024 | 7 | |a 10.1017/CBO9781139084772 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781139084772 | ||
035 | |a (OCoLC)1047816484 | ||
035 | |a (DE-599)BVBBV043944052 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 |a DE-706 |a DE-739 | ||
082 | 0 | |a 005.8/2 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
100 | 1 | |a Klein, Philip N. |e Verfasser |0 (DE-588)1044272996 |4 aut | |
245 | 1 | 0 | |a A cryptography primer |b secrets and promises |c Philip N. Klein, Brown University, Providence, Rhode Island |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2014 | |
300 | |a 1 online resource (xiii, 174 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
520 | |a Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Digital signatures | |
650 | 4 | |a Telecommunication / Safety measures | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-107-01788-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-107-60345-5 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9781139084772 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029353023 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9781139084772 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9781139084772 |l FHN01 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9781139084772 |l UBY01 |p ZDB-20-CBO |q UBY_PDA_CBO_Kauf22 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9781139084772 |l UPA01 |p ZDB-20-CBO |q UPA_PDA_CBO_Kauf2019 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176888540692480 |
---|---|
any_adam_object | |
author | Klein, Philip N. |
author_GND | (DE-588)1044272996 |
author_facet | Klein, Philip N. |
author_role | aut |
author_sort | Klein, Philip N. |
author_variant | p n k pn pnk |
building | Verbundindex |
bvnumber | BV043944052 |
classification_rvk | ST 276 SK 170 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9781139084772 (OCoLC)1047816484 (DE-599)BVBBV043944052 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
doi_str_mv | 10.1017/CBO9781139084772 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03086nmm a2200529zc 4500</leader><controlfield tag="001">BV043944052</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230711 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139084772</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-139-08477-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9781139084772</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781139084772</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1047816484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043944052</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Klein, Philip N.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1044272996</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A cryptography primer</subfield><subfield code="b">secrets and promises</subfield><subfield code="c">Philip N. Klein, Brown University, Providence, Rhode Island</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 174 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital signatures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication / Safety measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-107-01788-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-107-60345-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9781139084772</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029353023</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139084772</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139084772</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139084772</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBY_PDA_CBO_Kauf22</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139084772</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UPA_PDA_CBO_Kauf2019</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043944052 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:39:20Z |
institution | BVB |
isbn | 9781139084772 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029353023 |
oclc_num | 1047816484 |
open_access_boolean | |
owner | DE-12 DE-92 DE-706 DE-739 |
owner_facet | DE-12 DE-92 DE-706 DE-739 |
physical | 1 online resource (xiii, 174 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO ZDB-20-CBO UBY_PDA_CBO_Kauf22 ZDB-20-CBO UPA_PDA_CBO_Kauf2019 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Klein, Philip N. Verfasser (DE-588)1044272996 aut A cryptography primer secrets and promises Philip N. Klein, Brown University, Providence, Rhode Island Cambridge Cambridge University Press 2014 1 online resource (xiii, 174 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure Computer security Data encryption (Computer science) Digital signatures Telecommunication / Safety measures Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s 1\p DE-604 Erscheint auch als Druckausgabe 978-1-107-01788-7 Erscheint auch als Druckausgabe 978-1-107-60345-5 https://doi.org/10.1017/CBO9781139084772 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Klein, Philip N. A cryptography primer secrets and promises Computer security Data encryption (Computer science) Digital signatures Telecommunication / Safety measures Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | A cryptography primer secrets and promises |
title_auth | A cryptography primer secrets and promises |
title_exact_search | A cryptography primer secrets and promises |
title_full | A cryptography primer secrets and promises Philip N. Klein, Brown University, Providence, Rhode Island |
title_fullStr | A cryptography primer secrets and promises Philip N. Klein, Brown University, Providence, Rhode Island |
title_full_unstemmed | A cryptography primer secrets and promises Philip N. Klein, Brown University, Providence, Rhode Island |
title_short | A cryptography primer |
title_sort | a cryptography primer secrets and promises |
title_sub | secrets and promises |
topic | Computer security Data encryption (Computer science) Digital signatures Telecommunication / Safety measures Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security Data encryption (Computer science) Digital signatures Telecommunication / Safety measures Kryptologie |
url | https://doi.org/10.1017/CBO9781139084772 |
work_keys_str_mv | AT kleinphilipn acryptographyprimersecretsandpromises |