Buy Encyclopedia of Cryptography, Security and Privacy by Pierangela Samarati
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Data encryption > Encyclopedia of Cryptography, Security and Privacy
Encyclopedia of Cryptography, Security and Privacy

Encyclopedia of Cryptography, Security and Privacy


     0     
5
4
3
2
1



International Edition


X
About the Book

A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas.The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.

Table of Contents:
Security Policies and Access Control.- Public key encryption, digital signatures.- Number theory, primality tests, discrete log, factorisation.- Public-key cryptography, hardware, physical attacks.- Implementation aspects of cryptographic algorithms.- Hardware attacks.- Multi-party computation, voting schemes, digital signature schemes.- Web security.- DBMS and Application Security.- Biometrics.- Software Security.- Network Security.- Formal Methods and Assurance.- Sensor and Ad Hoc Networks.- DOS.- Privacy-preserving data mining.- Private information retrieval.- Privacy metrics and data protection.- Wireless Security.- Broadcast channel, secret sharing, threshold schemes, subliminal channels.- Risk management and organizational security and privacy.- Usable/user-centric privacy.- Less-constrained biometrics.- Access and Query Privacy.- Cryptocurrencies.- Encryption-Based Access Control Based on Public Key Cryptography.- Cyber-physical systems and infrastructure: security andprivacy.- Location privacy and privacy in locations-based applications.- Privacy in emerging scenarios.- Privacy and security in social networks.- Economics of security and privacy.- Key management.- Elliptic curve cryptography.- Sequences, Boolean functions, stream ciphers.- Secure multiparty computations.- Human Aspects in Security and Privacy.- Trustworthy Computing, Physical/Hardware Security.- AI approaches for security and privacy.- Privacy and anonymity in communication networks.- Privacy laws and directives.

About the Author :
Sushil Jajodia is University Professor, BDM International Professor, and the founding director of Center for Secure Information Systems in the Volgenau School of Engineering at the George Mason University, Fairfax, Virginia. He is also the director of the NSF I/UCRC Center for Cybersecurity Analytics and Automation (now in Phase II). Before coming to George Mason, he held permanent positions at the National Science Foundation; Naval Research Laboratory, Washington; and University of Missouri, Columbia. He has also been a visiting professor at the University of Milan, Sapienza University of Rome, Cambridge University, King's College London, Paris Dauphine University, and Imperial College. Dr. Jajodia received his PhD from the University of Oregon, Eugene. His research interests include security, privacy, databases, and distributed systems. He has authored or coauthored seven books, edited 52 books and conference proceedings, and published more than 500 technical papers in the refereed journals and conference proceedings. Five of his books have been translated in Chinese. He is also a holder of 23 patents. His current research sponsors are the Army Research Office, Office of Naval Research, National Security Agency, National Science Foundation, Northrop Grumman Corporation, and Intelligent Automation, Inc. Dr. Jajodia was elected a fellow of IEEE in January, 2013. His contributions to the field have been recognized with several awards: IFIP TC 11 Kristian Beckman Award (1996), Volgenau School of Engineering Outstanding Research Faculty Award (2000), ACM SIGSAC Outstanding Contributions Award (2008), IFIP WG 11.3 Outstanding Research Contributions Award (2011), ESORICS Outstanding Research Award (2015), Federal Information Systems Security Educators' Association (FISSEA) Educator of the Year Award (2016 ), IEEE Computer Society Technical Achievement Award (2016), and IEEE Computer Society W. Wallace McDowell Award (2020). He was recognized for the most accepted papers at the 30th anniversary of the IEEE Symposium on Security and Privacy. His h-index is 106 and Erdos number is 2. Pierangela Samarati is a Professor at the Department of Computer Science of the Università degli Studi di Milano, Italy. Her main research interests are on data and applications security and privacy, especially in emerging scenarios. She has coordinated and participated in several projects involving different aspects of information protection. She has published more than 280 peer-reviewed articles in international journals, conference proceedings, and book chapters. She has been Computer Scientist in the Computer Science Laboratory at SRI, CA (USA). She has been a visiting researcher at the Computer Science Department of Stanford University, CA (USA), and at the Center for Secure Information Systems of George Mason University, VA (USA). She is the chair of the IEEE Systems Council Technical Committee on Security and Privacy in Complex Information Systems (TCSPCIS), of the ERCIM Security and Trust Management Working Group (STM), and of the ACM Workshop on Privacy in the Electronic Society (WPES). She has been member of several scientific and technical committees and boards, also serving as chair. She is ACM Distinguished Scientist (named 2009) and IEEE Fellow (named 2012). She has received the ESORICS Outstanding Research Award (2018), the IEEE Computer Society Technical Achievement Award (2016), the IFIP WG 11.3 Outstanding Research Contributions Award (2012), and the IFIP TC11 Kristian Beckman Award (2008). She has been Editor in Chief for the Journal of Computer Security. She has been serving as Associate Editor of several journals, and as General Chair, Program Chair, and program committee member of several international conferences. Moti Yung is currently a Security and Privacy Research Scientist with Google. He got his PhD from Columbia University. Previously, he was with IBM Research, Certco, RSA Laboratories, and Snap. He is also an adjunct senior research faculty at Columbia, where he has co-advised and worked with numerous PhD students. Yung's contributions to research and development treat science and technology holistically: from the theoretical mathematical foundations, via conceptual mechanisms which typify computer science, to participation in developments of industrial products. Specifically: his work has been predicting future or emerging needs, employing cryptographic novel methods in general systems, and analyzing coming threats. These led to basic theoretical and applied notions, like: malicious cryptography (including ransomware attacks, and cryptosystems subversion known as kleptography); entity authentication technologies, including concurrent sessions in protocols; strong (chosen ciphertext secure) encryption; distributed cryptosystems for improving trust; digital signatures from simplified cryptography (related to hash-based signature); and numerous privacy preserving cryptographic protocols. His industrial work gave rise to new mechanisms. These include: public-key based second factor authentication device; numerous massively large scale (web and mobile) encryption schemes; large scale secure computation protocols for privacy preserving data analytics (perhaps the first such mainstream industrial application); and an ephemeral identities layer for beacons' privacy, and for the exposure notification smartphone API. Dr. Yung is a fellow of the IEEE, the Association for Computing Machinery (ACM), the International Association for Cryptologic Research (IACR), and the European Association for Theoretical Computer Science (EATCS). In 2010 he gave the IACR Distinguished Lecture. He is the recipient of the 2014 ACM's SIGSAC Outstanding Innovation award, and the 2014 ESORICS Outstanding Research award. For specific papers he received test-of-time awards in the 2020 IEEE Symposium on Security and Privacy for work published in 1996, and the 2020 IACR Public Key Cryptography conference for work published in 1998. In industry he got an IBM Outstanding Innovation award, a Google OC award, and a Google founders' award.


Best Sellers


Product Details
  • ISBN-13: 9783030715205
  • Publisher: Springer Nature Switzerland AG
  • Publisher Imprint: Springer Nature Switzerland AG
  • Edition: Revised edition
  • Language: English
  • Returnable: N
  • ISBN-10: 3030715205
  • Publisher Date: 27 Dec 2024
  • Binding: SA
  • Height: 254 mm
  • No of Pages: 2817
  • Width: 178 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Encyclopedia of Cryptography, Security and Privacy
Springer Nature Switzerland AG -
Encyclopedia of Cryptography, Security and Privacy
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Encyclopedia of Cryptography, Security and Privacy

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!