Secure Communicating Systems

Secure Communicating Systems : Design, Analysis, and Implementation

By (author) 

List price: US$500.00

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.show more

Product details

  • Online resource
  • Cambridge University Press (Virtual Publishing)
  • Cambridge, United Kingdom
  • English
  • 8 b/w illus. 9 tables
  • 1139164872
  • 9781139164870

Review quote

"The book can be a good text book at undergraduate level, and graduate level. It has a large number of exercises at the end of sections, and many subsections. This makes the textbook useful for the students...The book is well written to be suitable for self study. The researchers and professionals in the area of security may find the book useful as a reference." SIGACT Newsshow more

Table of contents

1. Secure communication in modern information societies; 2. Public-key cryptography; 3. Symmetric-key cryptography; 4. Security protocol design and analysis; 5. Optimal public-key encryption with RSA; 6. Secure information-flow analysis.show more