About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 140. Chapters: EPR paradox, RSA, Public-key cryptography, One-time pad, Email, Diffie-Hellman key exchange, Quantum key distribution, Quantum teleportation, War, Erd s number, Chaffing and winnowing, Man-in-the-middle attack, Communication complexity, Bell's theorem, Birthday attack, Anonymous internet banking, Social networking service, Placeholder name, History of cryptography, Cross-site scripting, Cryptographic hash function, Zero-knowledge proof, Anonymity, Session fixation, Commitment scheme, Public key certificate, Traffic analysis, Mental poker, Quantum indeterminacy, Jefferson disk, Deniable encryption, Certificate authority, Liberal paradox, Wiener's Attack, Ruritania, Rainbows End, Lamport signature, Secure multi-party computation, Needham-Schroeder protocol, Principle of locality, No-communication theorem, Speak of the devil, Online Certificate Status Protocol, Lawburrows, Alice and Bob, Cramer-Shoup cryptosystem, Elliptic Curve DSA, Diplomatic bag, Bell state, IMail, Ex turpi causa non oritur actio, SPEKE, Fluhrer, Mantin and Shamir attack, Methods of website linking, SYN flood, Unclean hands, Yao's principle, Self-signed certificate, Neuman-Stubblebine protocol, Replay attack, Blinding, Security protocol notation, Elliptic curve Diffie-Hellman, Decibel, Wide Mouth Frog protocol, Predictable serial number attack, Merkle's Puzzles, SuEXEC, Adversary. Excerpt: Electronic mail, commonly called email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neithe...