Cryptography for Security and Privacy in Cloud Computing:
As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Norwood
Artech House
2013
|
Ausgabe: | 1st ed |
Schlagworte: | |
Zusammenfassung: | As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers.This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (264 pages) |
ISBN: | 9781608075768 9781608075751 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044050399 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781608075768 |9 978-1-60807-576-8 | ||
020 | |a 9781608075751 |c Print |9 978-1-60807-575-1 | ||
035 | |a (ZDB-30-PAD)EBC1463547 | ||
035 | |a (ZDB-89-EBL)EBL1463547 | ||
035 | |a (ZDB-38-EBR)ebr11069356 | ||
035 | |a (OCoLC)904228420 | ||
035 | |a (DE-599)BVBBV044050399 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.82 | |
100 | 1 | |a Rass, Stefan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cryptography for Security and Privacy in Cloud Computing |
250 | |a 1st ed | ||
264 | 1 | |a Norwood |b Artech House |c 2013 | |
264 | 4 | |c © 2016 | |
300 | |a 1 online resource (264 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers.This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each | ||
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Slamanig, Daniel |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Rass, Stefan |t Cryptography for Security and Privacy in Cloud Computing |
912 | |a ZDB-30-PAD |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029457244 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177067849285632 |
---|---|
any_adam_object | |
author | Rass, Stefan |
author_facet | Rass, Stefan |
author_role | aut |
author_sort | Rass, Stefan |
author_variant | s r sr |
building | Verbundindex |
bvnumber | BV044050399 |
collection | ZDB-30-PAD ZDB-38-ESG |
ctrlnum | (ZDB-30-PAD)EBC1463547 (ZDB-89-EBL)EBL1463547 (ZDB-38-EBR)ebr11069356 (OCoLC)904228420 (DE-599)BVBBV044050399 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02408nmm a2200457zc 4500</leader><controlfield tag="001">BV044050399</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608075768</subfield><subfield code="9">978-1-60807-576-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608075751</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-60807-575-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC1463547</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1463547</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr11069356</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)904228420</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044050399</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rass, Stefan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography for Security and Privacy in Cloud Computing</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwood</subfield><subfield code="b">Artech House</subfield><subfield code="c">2013</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (264 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers.This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Slamanig, Daniel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Rass, Stefan</subfield><subfield code="t">Cryptography for Security and Privacy in Cloud Computing</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029457244</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044050399 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:42:11Z |
institution | BVB |
isbn | 9781608075768 9781608075751 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029457244 |
oclc_num | 904228420 |
open_access_boolean | |
physical | 1 online resource (264 pages) |
psigel | ZDB-30-PAD ZDB-38-ESG |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Artech House |
record_format | marc |
spelling | Rass, Stefan Verfasser aut Cryptography for Security and Privacy in Cloud Computing 1st ed Norwood Artech House 2013 © 2016 1 online resource (264 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers.This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each Cloud Computing (DE-588)7623494-0 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Cloud Computing (DE-588)7623494-0 s 1\p DE-604 Slamanig, Daniel Sonstige oth Erscheint auch als Druck-Ausgabe Rass, Stefan Cryptography for Security and Privacy in Cloud Computing 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Rass, Stefan Cryptography for Security and Privacy in Cloud Computing Cloud Computing (DE-588)7623494-0 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4033329-2 |
title | Cryptography for Security and Privacy in Cloud Computing |
title_auth | Cryptography for Security and Privacy in Cloud Computing |
title_exact_search | Cryptography for Security and Privacy in Cloud Computing |
title_full | Cryptography for Security and Privacy in Cloud Computing |
title_fullStr | Cryptography for Security and Privacy in Cloud Computing |
title_full_unstemmed | Cryptography for Security and Privacy in Cloud Computing |
title_short | Cryptography for Security and Privacy in Cloud Computing |
title_sort | cryptography for security and privacy in cloud computing |
topic | Cloud Computing (DE-588)7623494-0 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cloud Computing Kryptologie |
work_keys_str_mv | AT rassstefan cryptographyforsecurityandprivacyincloudcomputing AT slamanigdaniel cryptographyforsecurityandprivacyincloudcomputing |