Search Results - "key distribution"
Suggested Topics within your search.
Suggested Topics within your search.
-
1
Cryptography theory and practice
Published 2006Table of Contents: “…Classical cryptography -- Shannon's theory -- Block ciphers and the advanced encryption standard -- Cryptographic hash functions -- The RSA Cryptosystem and factoring integers -- Public-key cryptography and discrete logarithms -- Signature schemes -- Pseudo-random number generation -- Identification schemes and entity authentication -- Key distribution -- Key agreement schemes -- Public-key infrastructure -- Secret sharing schemes -- Multicast security and copyright protection…”
Book -
2
Network security essentials applications and standards
Published 2017Table of Contents: “…Public-Key Cryptography and Message 4. Key Distribution and User Authentication -- 5. Network Access Control and Cloud Security -- 6. …”
Book -
3
Emerging technologies in security and defence; and Quantum security II; and Unmanned sensor systems X 23-26 September 2013, Dresden, Germany
Published 2013Table of Contents: “…Security Proofs and Quantum Hacking -- Essential elements lacking in security proofs for quantum key distribution (Invited Paper) -- Quantum key distribution: vulnerable if imperfectly implemented -- Polarity inversion attack prevention by physical properties of Y00 quantum stream cipher -- Saturation attack on continuous-variable quantum key distribution system -- 6. …”
Book -
4
Network security essentials applications and standards
Published 2014Table of Contents: “…Ch. 1 Introduction -- Pt. 1 Cryptography -- Ch. 2 Symmetric Encryption and Message Confidentiality -- Ch. 3 Public-Key Cryptography and Message Authentication -- Pt. 2 Network Security Applications -- Ch. 4 Key Distribution an User Authentication -- Ch. 5 Network Access Control and Cloud Security -- Ch. 6 Transport-Level Security -- Ch. 7 Wireless Network Security -- Ch. 8 Electronic Mail Security -- Ch. 9 IP Security -- Pt. 3 System Security -- Ch. 10 Malicious Software -- Ch. 11 Intruders -- Ch. 12 Firewalls -- App. …”
Book


