Contemporary cryptology: the science of information integrity
The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function tha...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Piscataway, New Jersey
IEEE Press
c1992
|
Schlagworte: | |
Online-Zugang: | FHI01 FHN01 Volltext |
Zusammenfassung: | The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers |
Beschreibung: | "The Institute of Electrical and Electronics Engineers, Inc., New York.". - "IEEE order number: PC0271-7"--T.p. verso Description based on PDF viewed 12/21/2015 |
Beschreibung: | 1 Online-Resource (xv, 640 pages) illustrations |
ISBN: | 9780470544327 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046418305 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 200211s2015 |||| o||u| ||||||eng d | ||
020 | |a 9780470544327 |9 978-0-470-54432-7 | ||
024 | 7 | |a 10.1109/9780470544327 |2 doi | |
035 | |a (ZDB-35-WEL)5265879 | ||
035 | |a (OCoLC)1141124941 | ||
035 | |a (DE-599)BVBBV046418305 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-92 | ||
082 | 0 | |a 005.8/2 |2 22 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Contemporary cryptology |b the science of information integrity |c edited by Gustavus J. Simmons |
264 | 1 | |a Piscataway, New Jersey |b IEEE Press |c c1992 | |
300 | |a 1 Online-Resource (xv, 640 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "The Institute of Electrical and Electronics Engineers, Inc., New York.". - "IEEE order number: PC0271-7"--T.p. verso | ||
500 | |a Description based on PDF viewed 12/21/2015 | ||
520 | |a The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Telecommunication systems |x Security measures | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Simmons, Gustavus J. |e Sonstige |4 oth | |
710 | 2 | |a Institute of Electrical and Electronics Engineers |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780780353527 |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WEL | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031830777 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879 |l FHI01 |p ZDB-35-WEL |x Aggregator |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879 |l FHN01 |p ZDB-35-WEL |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180961605189632 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046418305 |
classification_rvk | ST 273 ST 276 |
collection | ZDB-35-WEL |
ctrlnum | (ZDB-35-WEL)5265879 (OCoLC)1141124941 (DE-599)BVBBV046418305 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03261nmm a2200529zc 4500</leader><controlfield tag="001">BV046418305</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200211s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470544327</subfield><subfield code="9">978-0-470-54432-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/9780470544327</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WEL)5265879</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1141124941</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046418305</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Contemporary cryptology</subfield><subfield code="b">the science of information integrity</subfield><subfield code="c">edited by Gustavus J. Simmons</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Piscataway, New Jersey</subfield><subfield code="b">IEEE Press</subfield><subfield code="c">c1992</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (xv, 640 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"The Institute of Electrical and Electronics Engineers, Inc., New York.". - "IEEE order number: PC0271-7"--T.p. verso</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on PDF viewed 12/21/2015</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Simmons, Gustavus J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Institute of Electrical and Electronics Engineers</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780780353527</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031830777</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV046418305 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:44:05Z |
institution | BVB |
isbn | 9780470544327 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031830777 |
oclc_num | 1141124941 |
open_access_boolean | |
owner | DE-573 DE-92 |
owner_facet | DE-573 DE-92 |
physical | 1 Online-Resource (xv, 640 pages) illustrations |
psigel | ZDB-35-WEL |
publishDate | 1992 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | IEEE Press |
record_format | marc |
spelling | Contemporary cryptology the science of information integrity edited by Gustavus J. Simmons Piscataway, New Jersey IEEE Press c1992 1 Online-Resource (xv, 640 pages) illustrations txt rdacontent c rdamedia cr rdacarrier "The Institute of Electrical and Electronics Engineers, Inc., New York.". - "IEEE order number: PC0271-7"--T.p. verso Description based on PDF viewed 12/21/2015 The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers Computer security Telecommunication systems Security measures Cryptography Kryptologie (DE-588)4033329-2 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Kryptologie (DE-588)4033329-2 s 2\p DE-604 Simmons, Gustavus J. Sonstige oth Institute of Electrical and Electronics Engineers Sonstige oth Erscheint auch als Druck-Ausgabe 9780780353527 https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879 Aggregator URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Contemporary cryptology the science of information integrity Computer security Telecommunication systems Security measures Cryptography Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4143413-4 |
title | Contemporary cryptology the science of information integrity |
title_auth | Contemporary cryptology the science of information integrity |
title_exact_search | Contemporary cryptology the science of information integrity |
title_full | Contemporary cryptology the science of information integrity edited by Gustavus J. Simmons |
title_fullStr | Contemporary cryptology the science of information integrity edited by Gustavus J. Simmons |
title_full_unstemmed | Contemporary cryptology the science of information integrity edited by Gustavus J. Simmons |
title_short | Contemporary cryptology |
title_sort | contemporary cryptology the science of information integrity |
title_sub | the science of information integrity |
topic | Computer security Telecommunication systems Security measures Cryptography Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security Telecommunication systems Security measures Cryptography Kryptologie Aufsatzsammlung |
url | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879 |
work_keys_str_mv | AT simmonsgustavusj contemporarycryptologythescienceofinformationintegrity AT instituteofelectricalandelectronicsengineers contemporarycryptologythescienceofinformationintegrity |