This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.1 Introduction.- 2 Background Theory.- 3 Private-Key Cryptosystems.- 4 Public-Key Cryptosystems.- 5 Pseudorandomness.- 6 Hashing.- 7 Digital Signatures.- 8 Authentication.- 9 Secret Sharing.- 10 Group-Oriented Cryptography.- 11 Key Establishment Protocols.- 12 Zero-Knowledge Proof Systems.- 13 Identification.- 14 Intrusion Detection.- 15 Electronic Elections and Digital Money.- 16 Database Protection and Security.- 17 Access Control.- 18 Network Security.- References.
From the reviews:
The goal of the book is to present the basic concepts in computer and network security. & It has 18 chapters, each & concluding with a set of exercises and problems. & the book overviews the most important topics of cryptography and some topics on computer security. It may be used for self-study, as well as a text for undergraduate and postgraduate courses. (Lenka Fibikova, Zentralblatt MATH, Issue 1011, 2003)
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication,lc+