This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Stephan Krenn received his PhD in computer science from the University of Fribourg (Switzerland). After postdoc positions at IST Austria and IBM Research - Zurich, he joined AIT's cryptography group in 2015, where he is now a senior scientist. His main research interests are in the domain of privacy-enhancing technologies, anonymous authentication, malleable digital signatures, or similar. He is actively participating in cryptographic standardization initiatives, and chair of IFIP WG11.6 on Identity Management.
Thomas Lorünser is a senior scientist and team leader in AIT’s Center for Digital Safety & Security with a strong background in digitization, IT security and applied cryptography. He holds a degree from Technical University of Vienna and various professional certifications (CISSP, zPM, CDPSE, ..). Additionally, he teaches selected topics in Cloud Computing, Internet of Things and IT Security and also actively contributes to security and cryptography standards in the International Organization for Standardization (ISO, JTC1/SC27).
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: Brook Bookstore On Demand, Napoli, NA, Italia
Condizione: new. Questo è un articolo print on demand. Codice articolo 40R3WSEYFP
Quantità: Più di 20 disponibili
Da: Rarewaves.com USA, London, LONDO, Regno Unito
Paperback. Condizione: New. 1st ed. 2023. Codice articolo LU-9783031281600
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783031281600_new
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research.This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists. 88 pp. Englisch. Codice articolo 9783031281600
Quantità: 2 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. 1st ed. 2023 edition NO-PA16APR2015-KAP. Codice articolo 26396294288
Quantità: 4 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. Print on Demand. Codice articolo 401164111
Quantità: 4 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 86 pages. 9.25x6.10x0.18 inches. In Stock. Codice articolo x-3031281608
Quantità: 2 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. PRINT ON DEMAND. Codice articolo 18396294298
Quantità: 4 disponibili
Da: moluna, Greven, Germania
Kartoniert / Broschiert. Condizione: New. Codice articolo 812308063
Quantità: Più di 20 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 88 pp. Englisch. Codice articolo 9783031281600
Quantità: 1 disponibili