語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
An introduction to secret sharing = ...
~
Krenn, Stephan.
FindBook
Google Book
Amazon
博客來
An introduction to secret sharing = a systematic overview and guide for protocol selection /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
An introduction to secret sharing/ by Stephan Krenn, Thomas Lorünser.
其他題名:
a systematic overview and guide for protocol selection /
作者:
Krenn, Stephan.
其他作者:
Lorünser, Thomas.
出版者:
Cham :Springer International Publishing : : 2023.,
面頁冊數:
x, 76 p. :ill., digital ;24 cm.
內容註:
1 Introduction -- 2. Preliminaries -- 3. Adversary Model for Secret Sharing Schemes -- 4. Basic Secret Sharing -- 5. Beyond Threshold Access Structures -- 6. Robust Secret Sharing -- 7. Verifiable Secret Sharing -- 8. Proactive Secret Sharing -- 9. Advanced Topics -- 10. Conclusion.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-031-28161-7
ISBN:
9783031281617
An introduction to secret sharing = a systematic overview and guide for protocol selection /
Krenn, Stephan.
An introduction to secret sharing
a systematic overview and guide for protocol selection /[electronic resource] :by Stephan Krenn, Thomas Lorünser. - Cham :Springer International Publishing :2023. - x, 76 p. :ill., digital ;24 cm. - SpringerBriefs in information security and cryptography,2731-9563. - SpringerBriefs in information security and cryptography..
1 Introduction -- 2. Preliminaries -- 3. Adversary Model for Secret Sharing Schemes -- 4. Basic Secret Sharing -- 5. Beyond Threshold Access Structures -- 6. Robust Secret Sharing -- 7. Verifiable Secret Sharing -- 8. Proactive Secret Sharing -- 9. Advanced Topics -- 10. Conclusion.
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.
ISBN: 9783031281617
Standard No.: 10.1007/978-3-031-28161-7doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / K74 2023
Dewey Class. No.: 005.8
An introduction to secret sharing = a systematic overview and guide for protocol selection /
LDR
:02333nmm a2200361 a 4500
001
2316981
003
DE-He213
005
20230328034538.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031281617
$q
(electronic bk.)
020
$a
9783031281600
$q
(paper)
024
7
$a
10.1007/978-3-031-28161-7
$2
doi
035
$a
978-3-031-28161-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
K74 2023
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
K92 2023
100
1
$a
Krenn, Stephan.
$3
3492361
245
1 3
$a
An introduction to secret sharing
$h
[electronic resource] :
$b
a systematic overview and guide for protocol selection /
$c
by Stephan Krenn, Thomas Lorünser.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
x, 76 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in information security and cryptography,
$x
2731-9563
505
0
$a
1 Introduction -- 2. Preliminaries -- 3. Adversary Model for Secret Sharing Schemes -- 4. Basic Secret Sharing -- 5. Beyond Threshold Access Structures -- 6. Robust Secret Sharing -- 7. Verifiable Secret Sharing -- 8. Proactive Secret Sharing -- 9. Advanced Topics -- 10. Conclusion.
520
$a
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.
650
0
$a
Computer security.
$3
540555
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cloud Computing.
$3
3231328
650
2 4
$a
Computer Networks.
$3
3592741
700
1
$a
Lorünser, Thomas.
$3
3630644
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in information security and cryptography.
$3
3630645
856
4 0
$u
https://doi.org/10.1007/978-3-031-28161-7
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9453231
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 K74 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入