Contemporary cryptology : (Record no. 42110)

000 -LEADER
fixed length control field 04787nam a2201081 i 4500
001 - CONTROL NUMBER
control field 5265879
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191218152117.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100317t20151992njua ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470544327
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780780353527
Qualifying information print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0470544325
Qualifying information electronic
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1109/9780470544327
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)mat05265879
035 ## - SYSTEM CONTROL NUMBER
System control number (IDAMS)0b000064810c5a47
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C6678 1992eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Edition number 22
245 00 - TITLE STATEMENT
Title Contemporary cryptology :
Remainder of title the science of information integrity /
Statement of responsibility, etc. edited by Gustavus J. Simmons.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Piscataway, New Jersey :
Name of producer, publisher, distributor, manufacturer IEEE Press,
Date of production, publication, distribution, manufacture, or copyright notice c1992.
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Piscataqay, New Jersey] :
Name of producer, publisher, distributor, manufacturer IEEE Xplore,
Date of production, publication, distribution, manufacture, or copyright notice [1999]
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xv, 640 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
500 ## - GENERAL NOTE
General note "The Institute of Electrical and Electronics Engineers, Inc., New York."
500 ## - GENERAL NOTE
General note "IEEE order number: PC0271-7"--T.p. verso.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note The data encryption standard : past and future / Miles E. Smid, Dennis K. Branstad -- Stream ciphers / Rainer A. Rueppel -- The first ten years of public key cryptology / Whitfield Diffie -- Public key cryptography / James Nechvatal -- A comparison of practical public key cryptosystems based on integer factorization and discrete logarithms /
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note How to insure that data acquired to verify treaty compliance are trustworth / G.J. Simmons.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Restricted to subscribers or individual electronic text purchasers.
520 ## - SUMMARY, ETC.
Summary, etc. The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 12/21/2015.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Telecommunication systems
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
695 ## -
-- Aircraft
695 ## -
-- Algorithm design and analysis
695 ## -
-- Authentication
695 ## -
-- Biographies
695 ## -
-- Chapters
695 ## -
-- Complexity theory
695 ## -
-- Computational complexity
695 ## -
-- Computers
695 ## -
-- Cryptography
695 ## -
-- Digital signatures
695 ## -
-- Elliptic curve cryptography
695 ## -
-- Encryption
695 ## -
-- Forgery
695 ## -
-- Games
695 ## -
-- Generators
695 ## -
-- Gold
695 ## -
-- Indexes
695 ## -
-- Instruments
695 ## -
-- Interpolation
695 ## -
-- Laboratories
695 ## -
-- Law
695 ## -
-- Linear systems
695 ## -
-- Local area networks
695 ## -
-- Monitoring
695 ## -
-- NIST
695 ## -
-- Nonvolatile memory
695 ## -
-- Nuclear weapons
695 ## -
-- Parity check codes
695 ## -
-- Pins
695 ## -
-- Polynomials
695 ## -
-- Probabilistic logic
695 ## -
-- Proposals
695 ## -
-- Protocols
695 ## -
-- Public key
695 ## -
-- Public key cryptography
695 ## -
-- Radar
695 ## -
-- Receivers
695 ## -
-- Registers
695 ## -
-- Sections
695 ## -
-- Security
695 ## -
-- Sensors
695 ## -
-- Signal processing algorithms
695 ## -
-- Smart cards
695 ## -
-- Transmitters
695 ## -
-- Very large scale integration
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Simmons, Gustavus J.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element John Wiley & Sons,
Relator term publisher.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Institute of Electrical and Electronics Engineers.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IEEE Xplore (Online service),
Relator term distributor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9780780353527
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879

No items available.


International Institute of Information Technology, Bangalore
26/C, Electronics City, Hosur Road,Bengaluru-560100 Contact Us
Koha & OPAC at IIITB deployed by Bhargav Sridhar & Team.

Powered by Koha