Kapitel
Lizenziert
Nicht lizenziert
Erfordert eine Authentifizierung
Chapter 15: Artificial Intelligence Security
-
Sarhan M. Musa
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Kapitel in diesem Buch
- Frontmatter i
- Contents vii
- Preface xxiii
- Chapter 1: Overview of Computer Networks 1
- Chapter 2: Mathematical Foundations for Computer Networks 29
- Chapter 3: Overview of Cryptography 107
- Chapter 4: Mathematical Foundations for Cryptography 133
- Chapter 5: Classical Cipher Schemes 191
- Chapter 6: Modern Symmetric Ciphers 211
- Chapter 7: Public-Key Cryptography for Data Confidentiality 283
- Chapter 8: Authentication Schemes 329
- Chapter 9: Centralized Authentication Service 381
- Chapter 10: Public Key Infrastructure (PKI) 399
- Chapter 11: Pretty Good Privacy 409
- Chapter 12: Internet Security Services 425
- Chapter 13: System Security 465
- Chapter 14: Security of Emerging Technology 477
- Chapter 15: Artificial Intelligence Security 525
- Bibliography 563
- Index 573
Kapitel in diesem Buch
- Frontmatter i
- Contents vii
- Preface xxiii
- Chapter 1: Overview of Computer Networks 1
- Chapter 2: Mathematical Foundations for Computer Networks 29
- Chapter 3: Overview of Cryptography 107
- Chapter 4: Mathematical Foundations for Cryptography 133
- Chapter 5: Classical Cipher Schemes 191
- Chapter 6: Modern Symmetric Ciphers 211
- Chapter 7: Public-Key Cryptography for Data Confidentiality 283
- Chapter 8: Authentication Schemes 329
- Chapter 9: Centralized Authentication Service 381
- Chapter 10: Public Key Infrastructure (PKI) 399
- Chapter 11: Pretty Good Privacy 409
- Chapter 12: Internet Security Services 425
- Chapter 13: System Security 465
- Chapter 14: Security of Emerging Technology 477
- Chapter 15: Artificial Intelligence Security 525
- Bibliography 563
- Index 573