Advertisement

Fundamentals of Computer Security

  • Josef Pieprzyk
  • Thomas Hardjono
  • Jennifer Seberry

Table of contents

  1. Front Matter
    Pages i-xx
  2. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 1-10
  3. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 11-67
  4. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 69-170
  5. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 171-218
  6. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 219-242
  7. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 243-281
  8. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 283-305
  9. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 307-325
  10. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 327-351
  11. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 353-377
  12. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 379-407
  13. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 409-431
  14. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 433-458
  15. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 459-497
  16. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 499-524
  17. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 525-564
  18. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 565-589
  19. Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 591-629
  20. Back Matter
    Pages 631-677

About this book

Introduction

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

Keywords

Access Control Advanced Encryption Standard Digitial Signatures Encryption Algorithms Hashing Algorithms authenication computer security cryptography data security database security electronic payment systems intrusion detection network securi network security security

Authors and affiliations

  • Josef Pieprzyk
    • 1
  • Thomas Hardjono
    • 2
  • Jennifer Seberry
    • 3
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia
  2. 2.VeriSign INC.WakefieldUSA
  3. 3.School of Information Technology and Computer ScienceUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-07324-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-642-07713-5
  • Online ISBN 978-3-662-07324-7
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering