This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-business systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
IntroductionBackground TheoryPrivate-Key CryptosystemsPublic-Key CryptosystemsPseudorandomnessHashingDigital SignaturesAuthenticationSecret SharingGroup-Oriented CryptographyKey Establishment ProtocolsZero-Knowledge Proof SystemsIdentificationIntrusion DetectionElectronic Elections and Digital MoneyDatabase Protection and SecurityAccess ControlNetwork Security
3-6-747/1/A and 3-6-754/1,
Himayatnagar, Hyderabad 500 029
Phone: (040) 2766 2849/2850/5446/5447
Fax: (040) 2764 5046