Normal view MARC view ISBD view

Functional encryption

By: Ahmad, Khairol Amali Bin.
Contributor(s): Ahmad, Khaleel | Dulhare, Uma N.
Series: EAI/Springer Innovations in Communication and Computing, 2522-8595.Publisher: Cham : Springer, 2021Description: x, 309 p. ; ill. (some col.), 24 cm.ISBN: 9783030608897.Subject(s): Data encryption | Electrical engineering | Data structures | Computer science | Asymmetric key cryptography | Literature review | Bilinear mapping | Bonah-Franklin scheme | Ciphertext policy-ABE (CP-ABE) | Decryption | Diffie-Hellman key exchange | Digital signature algorithm (DSA) | Discrete logrithm (DL) problem | Fuzzy identity based encryption (FIBE) | Identity based encryption (IBE) | Key policy-ABE (KP-ABE) | Private key generators | Public key infrstructure (PKI) | Quadratic residuosity problem | Random Oracle(RO) | IFP,DLP | Shortest possible signature | Signcryption | Symmetric encryption | Wildcards key derivation (WKD)DDC classification: 621.382 Summary: This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Status Date due Barcode
Books 621.382 AHM (Browse shelf) Available 032684

Includes index.

This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha