000 | a | ||
---|---|---|---|
999 |
_c30481 _d30481 |
||
008 | 211203b xxu||||| |||| 00| 0 eng d | ||
020 | _a9783030608897 | ||
082 |
_a621.382 _bAHM |
||
100 | _aAhmad, Khairol Amali Bin | ||
245 | _aFunctional encryption | ||
260 |
_bSpringer, _c2021 _aCham : |
||
300 |
_ax, 309 p. ; _bill. (some col.), _c24 cm |
||
365 |
_b149.99 _cEUR _d90.80 |
||
490 |
_aEAI/Springer Innovations in Communication and Computing, _v2522-8595 |
||
504 | _aIncludes index. | ||
520 | _aThis book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc. | ||
650 | _aData encryption | ||
650 | _aElectrical engineering | ||
650 | _aData structures | ||
650 | _aComputer science | ||
650 | _aAsymmetric key cryptography | ||
650 | _a Literature review | ||
650 | _aBilinear mapping | ||
650 | _a Bonah-Franklin scheme | ||
650 | _a Ciphertext policy-ABE (CP-ABE) | ||
650 | _aDecryption | ||
650 | _aDiffie-Hellman key exchange | ||
650 | _aDigital signature algorithm (DSA) | ||
650 | _a Discrete logrithm (DL) problem | ||
650 | _aFuzzy identity based encryption (FIBE) | ||
650 | _aIdentity based encryption (IBE) | ||
650 | _aKey policy-ABE (KP-ABE) | ||
650 | _aPrivate key generators | ||
650 | _a Public key infrstructure (PKI) | ||
650 | _a Quadratic residuosity problem | ||
650 | _aRandom Oracle(RO) | ||
650 | _a IFP,DLP | ||
650 | _a Shortest possible signature | ||
650 | _aSigncryption | ||
650 | _a Symmetric encryption | ||
650 | _aWildcards key derivation (WKD) | ||
710 | _aAhmad, Khaleel | ||
710 | _aDulhare, Uma N. | ||
942 |
_2ddc _cBK |