1. Secure communication in modern information societies; 2. Public-key cryptography; 3. Symmetric-key cryptography; 4. Security protocol design and analysis; 5. Optimal public-key encryption with RSA; 6. Secure information-flow analysis.
What every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs.
"The book can be a good text book at undergraduate level, and graduate level. It has a large number of exercises at the end of sections, and many subsections. This makes the textbook useful for the students...The book is well written to be suitable for self study. The researchers and professionals in the area of security may find the book useful as a reference." SIGACT News
![]() |
Ask a Question About this Product More... |
![]() |