Encyclopedia of Cryptography, Security and Privacy
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third...
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer Nature Switzerland
2025, 2025
|
Edition: | 3rd ed. 2025 |
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Security Policies and Access Control
- Public key encryption, digital signatures
- Number theory, primality tests, discrete log, factorisation
- Public-key cryptography, hardware, physical attacks
- Implementation aspects of cryptographic algorithms
- Hardware attacks
- Multi-party computation, voting schemes, digital signature schemes
- Web security
- DBMS and Application Security
- Biometrics
- Software Security
- Network Security
- Formal Methods and Assurance
- Sensor and Ad Hoc Networks
- DOS
- Privacy-preserving data mining
- Private information retrieval
- Privacy metrics and data protection
- Wireless Security
- Broadcast channel, secret sharing, threshold schemes, subliminal channels
- Risk management and organizational security and privacy
- Usable/user-centric privacy
- Less-constrained biometrics
- Access and Query Privacy
- Cryptocurrencies
- Encryption-Based Access Control Based on Public Key Cryptography
- Cyber-physical systems and infrastructure: security andprivacy
- Location privacy and privacy in locations-based applications
- Privacy in emerging scenarios
- Privacy and security in social networks
- Economics of security and privacy
- Key management
- Elliptic curve cryptography
- Sequences, Boolean functions, stream ciphers
- Secure multiparty computations
- Human Aspects in Security and Privacy
- Trustworthy Computing, Physical/Hardware Security
- AI approaches for security and privacy
- Privacy and anonymity in communication networks
- Privacy laws and directives