Cryptography for security and privacy in cloud computing
As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boston
Artech House
2014
|
| Series: | Artech House information security and privacy series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | TK 5105.59 .R37 2014 |
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 105647 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220042650.0 | ||
| 008 | 221104 2014 xxua abi 001 | eng d | ||
| 020 | |a 9781608075751 (hbk.) | ||
| 020 | |a 1608075753 (hbk.) | ||
| 039 | 9 | |a 202211041148 |b VLOAD |c 201610171148 |d johari |y 201512151306 |z hasniza | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.59 |b .R37 2014 | ||
| 100 | 1 | |a Rass, Stefan., |e author. | |
| 245 | 1 | 0 | |a Cryptography for security and privacy in cloud computing |c Stefan Rass, Daniel Slamanig. |
| 264 | 1 | |a Boston |b Artech House |c 2014 | |
| 300 | |a viii, 255 pages |b illustrations |c 24 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 400 | 0 | |a Stefan Rass. | |
| 490 | 1 | |a Artech House information security and privacy series | |
| 504 | |a Includes bibliographical references and index. | ||
| 520 | |a As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers. This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each. | ||
| 592 | |a 0009110/15 |b 11/08/2016 |c RM 627.56 |h Areesh | ||
| 650 | 0 | |a Computer networks |x Security measures. | |
| 650 | 0 | |a Cloud computing. | |
| 700 | 1 | |a Slamanig, Daniel, |e author. | |
| 830 | 0 | |a Artech House information security and privacy series | |
| 999 | |a vtls000056285 |c 105647 |d 105647 | ||


