logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Verifiable Composition Of Signature And Encryption A Comprehensive Study Of The Design Paradigms 1st Edition Laila El Aimani Auth

  • SKU: BELL-6790688
Verifiable Composition Of Signature And Encryption A Comprehensive Study Of The Design Paradigms 1st Edition Laila El Aimani Auth
$ 31.00 $ 45.00 (-31%)

4.1

50 reviews

Verifiable Composition Of Signature And Encryption A Comprehensive Study Of The Design Paradigms 1st Edition Laila El Aimani Auth instant download after payment.

Publisher: Springer International Publishing
File Extension: PDF
File size: 5.02 MB
Pages: 154
Author: Laila El Aimani (auth.)
ISBN: 9783319681115, 9783319681122, 3319681117, 3319681125
Language: English
Year: 2017
Edition: 1

Product desciption

Verifiable Composition Of Signature And Encryption A Comprehensive Study Of The Design Paradigms 1st Edition Laila El Aimani Auth by Laila El Aimani (auth.) 9783319681115, 9783319681122, 3319681117, 3319681125 instant download after payment.

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data.

This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way.

This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

Related Products