Cryptography for Security and Privacy in Cloud Computing.

As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new...

Full description

Saved in:
Bibliographic Details
Main Author: Rass, Stefan
Other Authors: Slamanig, Daniel
Format: eBook
Language:English
Published: Norwood : Artech House, 2013.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000Mu 4500
001 ocn905527313
003 OCoLC
005 20241006213017.0
006 m o d
007 cr mn|---|||||
008 150303s2013 xx o 000 0 eng d
040 |a AU-PeEL  |b eng  |e pn  |c STF  |d OCLCQ  |d EBLCP  |d OCLCQ  |d ZCU  |d MERUC  |d STF  |d ICG  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d AU@  |d OCLCQ  |d DKC  |d OCLCQ  |d BWN  |d OCLCQ  |d IEEEE  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d UEJ  |d OCLCQ 
019 |a 1388676306 
020 |a 9781608075751  |q (print) 
020 |a 1608075753  |q (print) 
020 |a 9781608075768  |q (electronic bk.) 
020 |a 1608075761  |q (electronic bk.) 
035 |a (OCoLC)905527313  |z (OCoLC)1388676306 
050 4 |a TK5105.59  |b .R37 2014 
072 0 |a TEC009000 
049 |a HCDD 
100 1 |a Rass, Stefan. 
245 1 0 |a Cryptography for Security and Privacy in Cloud Computing. 
260 |a Norwood :  |b Artech House,  |c 2013. 
300 |a 1 online resource (264 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES. 
505 8 |a 2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar. 
520 |a As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers. This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cloud computing. 
650 7 |a Cloud computing  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Slamanig, Daniel. 
758 |i has work:  |a Cryptography for Security and Privacy in Cloud Computing (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXHbTYPRTkd8RBV7wwfhjK  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 1 |z 9781608075751 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=1463547  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD