
Secure Communicating Systems
Design, Analysis, and Implementation
- Publisher's listprice GBP 74.00
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 7 490 Ft off)
- Discounted price 29 961 Ft (28 534 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
37 451 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Cambridge University Press
- Date of Publication 27 August 2001
- ISBN 9780521807319
- Binding Hardback
- No. of pages296 pages
- Size 262x184x22 mm
- Weight 694 g
- Language English
- Illustrations 8 b/w illus. 9 tables 0
Categories
Short description:
What every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs.
MoreLong description:
More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.
"The book can be a good text book at undergraduate level, and graduate level. It has a large number of exercises at the end of sections, and many subsections. This makes the textbook useful for the students...The book is well written to be suitable for self study. The researchers and professionals in the area of security may find the book useful as a reference."
SIGACT News
Table of Contents:
1. Secure communication in modern information societies; 2. Public-key cryptography; 3. Symmetric-key cryptography; 4. Security protocol design and analysis; 5. Optimal public-key encryption with RSA; 6. Secure information-flow analysis.
More