|
|
|
|
LEADER |
01549nam a22002895i 4500 |
001 |
000294966 |
005 |
20211018130354.0 |
007 |
cr nn 008mamaa |
008 |
171028s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319681122
|
024 |
7 |
|
|a 10.1007/978-3-319-68112-2
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
100 |
1 |
|
|a El Aimani, Laila.
|e author.
|
245 |
1 |
0 |
|a Verifiable Composition of Signature and Encryption :
|b A Comprehensive Study of the Design Paradigms /
|c by Laila El Aimani.
|
250 |
|
|
|a 1st ed. 2017.
|
260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XX, 148 p. 34 illus., 5 illus. in color. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Part I: Background -- 1. Preliminaries -- 2. Case-study primitives -- Part II: the "Sign then Encrypt" (StE) paradigm -- 3. Analysis of StE -- 4. An efficient variant of StE -- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm -- 5. Analysis of CtEaS -- 6. CtEtS: an efficient variant of CtEaS -- Part IV: New paradigms -- 7. EtStE: a new paradigm for verifiable signcryption -- 8. Multi-user security -- 9. Insider privacy.-10. Wrap - up.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
1 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Mathematics of Computing.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|