000 a
999 _c30481
_d30481
008 211203b xxu||||| |||| 00| 0 eng d
020 _a9783030608897
082 _a621.382
_bAHM
100 _aAhmad, Khairol Amali Bin
245 _aFunctional encryption
260 _bSpringer,
_c2021
_aCham :
300 _ax, 309 p. ;
_bill. (some col.),
_c24 cm
365 _b149.99
_cEUR
_d90.80
490 _aEAI/Springer Innovations in Communication and Computing,
_v2522-8595
504 _aIncludes index.
520 _aThis book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
650 _aData encryption
650 _aElectrical engineering
650 _aData structures
650 _aComputer science
650 _aAsymmetric key cryptography
650 _a Literature review
650 _aBilinear mapping
650 _a Bonah-Franklin scheme
650 _a Ciphertext policy-ABE (CP-ABE)
650 _aDecryption
650 _aDiffie-Hellman key exchange
650 _aDigital signature algorithm (DSA)
650 _a Discrete logrithm (DL) problem
650 _aFuzzy identity based encryption (FIBE)
650 _aIdentity based encryption (IBE)
650 _aKey policy-ABE (KP-ABE)
650 _aPrivate key generators
650 _a Public key infrstructure (PKI)
650 _a Quadratic residuosity problem
650 _aRandom Oracle(RO)
650 _a IFP,DLP
650 _a Shortest possible signature
650 _aSigncryption
650 _a Symmetric encryption
650 _aWildcards key derivation (WKD)
710 _aAhmad, Khaleel
710 _aDulhare, Uma N.
942 _2ddc
_cBK