Skip to content
Open global navigation

Cambridge University Press

AcademicLocation selectorSearch toggleMain navigation toggle
Cart
Register Sign in Wishlist
Secure Communicating Systems

Secure Communicating Systems
Design, Analysis, and Implementation

$89.99

  • Date Published: August 2001
  • availability: In stock
  • format: Hardback
  • isbn: 9780521807319

$89.99
Hardback

Add to cart Add to wishlist

Other available formats:
eBook


Request examination copy

Instructors may request a copy of this title for examination

Description
Product filter button
Description
Contents
Resources
Courses
About the Authors
  • This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical implementation; standard security models for information flow in computer programs or human organizations; and moral, legal, and political issues. Another novel feature is the presentation of a formal model-checking tool for specifying and debugging security protocols. A supporting web site http://www.cis.ksu.edu/~huth/scs contains Java source code for the programs featured plus links to other sites.

    • Full description of the new Advanced Encryption Standard Rijndael, announced as the winner of the NIST AES competition on October 10, 2000
    • Exposition of a formal tool for modeling and analyzing security protocols plus two analyses for secure information flow in programs
    • A chapter on optimal public-key encryption with RSA, a realistic implementation of RSA that is likely to be part of PKCS#1 version 2
    Read more

    Reviews & endorsements

    "The book can be a good text book at undergraduate level, and graduate level. It has a large number of exercises at the end of sections, and many subsections. This makes the textbook useful for the students...The book is well written to be suitable for self study. The researchers and professionals in the area of security may find the book useful as a reference."
    SIGACT News

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity

    ×

    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?

    ×

    Product details

    • Date Published: August 2001
    • format: Hardback
    • isbn: 9780521807319
    • length: 296 pages
    • dimensions: 262 x 184 x 22 mm
    • weight: 0.694kg
    • contains: 8 b/w illus. 9 tables
    • availability: In stock
  • Table of Contents

    1. Secure communication in modern information societies
    2. Public-key cryptography
    3. Symmetric-key cryptography
    4. Security protocol design and analysis
    5. Optimal public-key encryption with RSA
    6. Secure information-flow analysis.

  • Author

    Michael R. A. Huth, University of London

Sign In

Please sign in to access your account

Cancel

Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email cflack@cambridge.org

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website, your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Find content that relates to you

© Cambridge University Press 2014

Back to top

Are you sure you want to delete your account?

This cannot be undone.

Cancel Delete

Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

×
Please fill in the required fields in your feedback submission.
×