Chapter
Licensed
Unlicensed
Requires Authentication
Bibliography
-
Sarhan M. Musa
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xxiii
- Chapter 1: Overview of Computer Networks 1
- Chapter 2: Mathematical Foundations for Computer Networks 29
- Chapter 3: Overview of Cryptography 107
- Chapter 4: Mathematical Foundations for Cryptography 133
- Chapter 5: Classical Cipher Schemes 191
- Chapter 6: Modern Symmetric Ciphers 211
- Chapter 7: Public-Key Cryptography for Data Confidentiality 283
- Chapter 8: Authentication Schemes 329
- Chapter 9: Centralized Authentication Service 381
- Chapter 10: Public Key Infrastructure (PKI) 399
- Chapter 11: Pretty Good Privacy 409
- Chapter 12: Internet Security Services 425
- Chapter 13: System Security 465
- Chapter 14: Security of Emerging Technology 477
- Chapter 15: Artificial Intelligence Security 525
- Bibliography 563
- Index 573
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xxiii
- Chapter 1: Overview of Computer Networks 1
- Chapter 2: Mathematical Foundations for Computer Networks 29
- Chapter 3: Overview of Cryptography 107
- Chapter 4: Mathematical Foundations for Cryptography 133
- Chapter 5: Classical Cipher Schemes 191
- Chapter 6: Modern Symmetric Ciphers 211
- Chapter 7: Public-Key Cryptography for Data Confidentiality 283
- Chapter 8: Authentication Schemes 329
- Chapter 9: Centralized Authentication Service 381
- Chapter 10: Public Key Infrastructure (PKI) 399
- Chapter 11: Pretty Good Privacy 409
- Chapter 12: Internet Security Services 425
- Chapter 13: System Security 465
- Chapter 14: Security of Emerging Technology 477
- Chapter 15: Artificial Intelligence Security 525
- Bibliography 563
- Index 573