
Modern Cryptography
About this book
• •Specifies which protocols are to be followed and which are to be avoided, providing security engineers with essential knowledge. •Dissects schemes and protocols in standards and real-world cases, pointing out their strong security strengths and weaknesses. •Opens the "bag of tricks" attackers use and gives cryptographers countermeasures.
Details
- OL Work ID
- OL7947479W
Subjects
Access controlComputersCryptographyData transmission systemsSecurity measuresComputers, access control