RSA Securitys Official Guide to Cryptography
Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security--the most trusted name in e-security(tm). Part of the RSA Press Series.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Security Provided by Computer Operating Systems
201 other sections not shown
Other editions - View all
algorithm application associated attack authentication authority BER encoding biometric bits block break bytes called certificate Chapter cipher ciphertext client communicate components contains contents create crypto cryptographic Daniel decrypt defined described developed device digest digital signature document electronic encoding encrypt envelope example exchange extension FF FF FF field Figure function give Gwen header identifier implement indicates Internet known look means method mode octets operations optional original Pao-Chi parties password perform PKCS plaintext possible private key PRNG probably problem produce protect protocol public key random received recovery request result Satomi secret server session key share signed simply smart card someone specification standard string token trust various verify Version
All Book Search results »
Proceedings of the 3rd European Conference on Information Warfare and ...
No preview available - 2004