Coverart for item
The Resource Malicious cryptography : exposing cryptovirology, Adam Young, Moti Yung

Malicious cryptography : exposing cryptovirology, Adam Young, Moti Yung

Label
Malicious cryptography : exposing cryptovirology
Title
Malicious cryptography
Title remainder
exposing cryptovirology
Statement of responsibility
Adam Young, Moti Yung
Creator
Contributor
Author
Subject
Language
eng
Cataloging source
UMI
http://library.link/vocab/creatorDate
1972-
http://library.link/vocab/creatorName
Young, Adam
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Yung, Moti
http://library.link/vocab/subjectName
  • Computer security
  • Cryptography
  • Computer viruses
  • Data protection
Label
Malicious cryptography : exposing cryptovirology, Adam Young, Moti Yung
Link
http://databases.mvlc.org/connect/safari?uiCode=&xmlId=9780764568466
Instantiates
Publication
Copyright
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Through hacker's eyes -- Cryptovirology -- Tools for security and insecurity -- The two faces of anonymity -- Cryptocounters -- Computationally secure information stealing -- Non-zero sum games and survivable malware -- Coping with malicious software -- The nature of Trojan horses -- Subliminal channels -- SETUP attack on factoring based key generation -- SETUP attacks on discrete-log cryptosystems
Control code
ocn946596233
Dimensions
unknown
Extent
1 online resource (1 volume)
Form of item
online
Isbn
9780764568466
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
Sound
unknown sound
Specific material designation
remote
Stock number
CL0500000731
Label
Malicious cryptography : exposing cryptovirology, Adam Young, Moti Yung
Link
http://databases.mvlc.org/connect/safari?uiCode=&xmlId=9780764568466
Publication
Copyright
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Through hacker's eyes -- Cryptovirology -- Tools for security and insecurity -- The two faces of anonymity -- Cryptocounters -- Computationally secure information stealing -- Non-zero sum games and survivable malware -- Coping with malicious software -- The nature of Trojan horses -- Subliminal channels -- SETUP attack on factoring based key generation -- SETUP attacks on discrete-log cryptosystems
Control code
ocn946596233
Dimensions
unknown
Extent
1 online resource (1 volume)
Form of item
online
Isbn
9780764568466
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
Sound
unknown sound
Specific material designation
remote
Stock number
CL0500000731

Library Locations

    • Merrimack Valley Library ConsortiumBorrow it
      4 High Street, Suite 175, North Andover, MA, 01845, US
      42.7009413 -71.1255084
Processing Feedback ...