Search Results - "key distribution"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Cryptography theory and practice by Stinson, Douglas R. (Douglas Robert) 1956-

    Published 2006
    Table of Contents: “…Classical cryptography -- Shannon's theory -- Block ciphers and the advanced encryption standard -- Cryptographic hash functions -- The RSA Cryptosystem and factoring integers -- Public-key cryptography and discrete logarithms -- Signature schemes -- Pseudo-random number generation -- Identification schemes and entity authentication -- Key distribution -- Key agreement schemes -- Public-key infrastructure -- Secret sharing schemes -- Multicast security and copyright protection…”
    Book
  2. 2

    Network security essentials applications and standards by Stallings, William

    Published 2017
    Table of Contents: “…Public-Key Cryptography and Message 4. Key Distribution and User Authentication -- 5. Network Access Control and Cloud Security -- 6. …”
    Book
  3. 3

    Emerging technologies in security and defence; and Quantum security II; and Unmanned sensor systems X 23-26 September 2013, Dresden, Germany

    Published 2013
    Table of Contents: “…Security Proofs and Quantum Hacking -- Essential elements lacking in security proofs for quantum key distribution (Invited Paper) -- Quantum key distribution: vulnerable if imperfectly implemented -- Polarity inversion attack prevention by physical properties of Y00 quantum stream cipher -- Saturation attack on continuous-variable quantum key distribution system -- 6. …”
    Book
  4. 4

    Network security essentials applications and standards by Stallings, William

    Published 2014
    Table of Contents: “…Ch. 1 Introduction -- Pt. 1 Cryptography -- Ch. 2 Symmetric Encryption and Message Confidentiality -- Ch. 3 Public-Key Cryptography and Message Authentication -- Pt. 2 Network Security Applications -- Ch. 4 Key Distribution an User Authentication -- Ch. 5 Network Access Control and Cloud Security -- Ch. 6 Transport-Level Security -- Ch. 7 Wireless Network Security -- Ch. 8 Electronic Mail Security -- Ch. 9 IP Security -- Pt. 3 System Security -- Ch. 10 Malicious Software -- Ch. 11 Intruders -- Ch. 12 Firewalls -- App. …”
    Book