New and Published Books
1-8 of 8 results in Chapman & Hall/CRC Cryptography and Network Security Series
Group theoretic problems appear to be the most promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using nonabelian groups in the field of cryptography. It provides an introduction to cryptography (mostly...
Published June 14th 2012 by Chapman and Hall/CRC
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in...
Published May 28th 2012 by Chapman and Hall/CRC
Information on integrating soft computing techniques into video surveillance is widely scattered among conference papers, journal articles, and books. Bringing this research together in one source, Handbook on Soft Computing for Video Surveillance illustrates the application of soft computing...
Published January 24th 2012 by Chapman and Hall/CRC
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment...
Published August 1st 2010 by Chapman and Hall/CRC
A Logical Approach
Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use...
Published July 25th 2010 by Chapman and Hall/CRC
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known...
Published July 20th 2009 by Chapman and Hall/CRC
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code...
Published June 14th 2009 by Chapman and Hall/CRC
Principles and Protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous...
Published August 30th 2007 by Chapman and Hall/CRC
Introduction to Modern Cryptography, Second Edition
To Be Published November 10th 2014
Group Theoretic Cryptography
To Be Published March 25th 2015