Hardcover. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Hardcover. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 1.
Hardcover. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.
Published by Pearson Education, Limited, 2003
ISBN 10: 0130669431 ISBN 13: 9780130669438
Language: English
Seller: Better World Books, Mishawaka, IN, U.S.A.
First Edition
Condition: Good. 1st. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Condition: acceptable. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Acceptable condition! Any other included accessories are also in Acceptable condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear such as cover tears discoloration, staining, marks, scuffs, etc. All pages intact.
Condition: new.
Hardcover. Condition: New.
US$ 63.00
Convert currencyQuantity: 1 available
Add to basketHardcover. Condition: New. Language:English.Author:Mao Wenbo.Binding:HardCover.
hardcover. Condition: New. In shrink wrap. Looks like an interesting title!
Published by Pearson Education (US), United States, Upper Saddle River, 2003
ISBN 10: 0130669431 ISBN 13: 9780130669438
Language: English
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
US$ 120.02
Convert currencyQuantity: 2 available
Add to basketPaperback. Condition: Very Good. Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need. Coverage includes: Crypto foundations: probability, information theory, computational complexity, number theory, algebraic techniques, and more Authentication: basic techniques and principles vs. misconceptions and consequential attacks Evaluating real-world protocol standards including IPSec, IKE, SSH, TLS (SSL), and Kerberos Designing stronger counterparts to vulnerable "textbook" crypto schemes Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.