Oblivion

Oblivion

Author: Harry J. Maihafer

Publisher: Potomac Books

Published: 1996

Total Pages: 264

ISBN-13:

DOWNLOAD EBOOK

"On Saturday, January 14, 1950, at 6:18 P.M., Cadet Richard Cox left his room at the U.S. Military Academy at West Point to go to dinner with an unidentified visitor. The man was supposedly someone Cox had known when they served in an intelligence unit in Germany. Cox never returned. In 1957, Richard Cox was declared legally dead, and the files were closed. It was as if he had vanished off the face of the earth." "Then in 1985, thirty-five years after Cox's disappearance, a retired history teacher named Marshall Jacobs decided to pursue the mystery as a research project. Through the Freedom of Information Act, he obtained voluminous once-secret files from the Army and FBI. Jacobs plunged into a labyrinthine search - and what began as a hobby became an obsession. He traveled the country interviewing witnesses from the Florida Keys to the Pacific Northwest. What he discovered were tales of murder, intrigue, and cover-up. It took more than seven years, but Jacobs eventually found the one witness who enabled him to bring the case to closure." "In Oblivion, Harry J. Maihafer tell the enthralling story of Jacob's search for Richard Cox. Its startling climax is one that readers will long remember."--BOOK JACKET.Title Summary field provided by Blackwell North America, Inc. All Rights Reserved


Foundations of Cryptography: Volume 2, Basic Applications

Foundations of Cryptography: Volume 2, Basic Applications

Author: Oded Goldreich

Publisher: Cambridge University Press

Published: 2009-09-17

Total Pages: 390

ISBN-13: 1107393973

DOWNLOAD EBOOK

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.


Public-Key Cryptography

Public-Key Cryptography

Author: Arto Salomaa

Publisher: Springer Science & Business Media

Published: 1996-10-25

Total Pages: 296

ISBN-13: 9783540613565

DOWNLOAD EBOOK

Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992


Applied Cryptography and Network Security

Applied Cryptography and Network Security

Author: Jonathan Katz

Publisher: Springer

Published: 2007-06-23

Total Pages: 502

ISBN-13: 3540727388

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revised full papers cover signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, and security in wireless, ad-hoc, and peer-to-peer networks.


Public Key Cryptography

Public Key Cryptography

Author: Hideki Imai

Publisher: Springer Science & Business Media

Published: 1999-02-17

Total Pages: 337

ISBN-13: 3540656448

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce.


Computing and Combinatorics

Computing and Combinatorics

Author: Bin Fu

Publisher: Springer

Published: 2011-07-18

Total Pages: 662

ISBN-13: 364222685X

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 17th Annual International Conference on Computing and Combinatorics, held in Dallas, TX, USA, in August 2011. The 54 revised full papers presented were carefully reviewed and selected from 136 submissions. Topics covered are algorithms and data structures; algorithmic game theory and online algorithms; automata, languages, logic, and computability; combinatorics related to algorithms and complexity; complexity theory; computational learning theory and knowledge discovery; cryptography, reliability and security, and database theory; computational biology and bioinformatics; computational algebra, geometry, and number theory; graph drawing and information visualization; graph theory, communication networks, and optimization; parallel and distributed computing.


Public Key Cryptography - PKC 2005

Public Key Cryptography - PKC 2005

Author: Serge Vaudenay

Publisher: Springer Science & Business Media

Published: 2005-01-13

Total Pages: 444

ISBN-13: 3540244549

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2005, held in Les Diablerets, Switzerland in January 2005. The 28 revised full papers presented were carefully reviewed and selected from 126 submissions. The papers are organized in topical sections on cryptanalysis, key establishment, optimization, building blocks, RSA cryptography, multivariate asymmetric cryptography, signature schemes, and identity-based cryptography.


Theory of Cryptography

Theory of Cryptography

Author: Moni Naor

Publisher: Springer

Published: 2004-03-23

Total Pages: 533

ISBN-13: 354024638X

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the first International Theory of Cryptography Conference, TCC 2004, held in Cambridge, MA, USA in February 2004. The 28 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers constitute a unique account of original research results on theoretical and foundational topics in cryptography; they deal with the paradigms, approaches, and techniques used to conceptualize, define, and provide solutions to natural cryptographic problems.


Selected Areas in Cryptography

Selected Areas in Cryptography

Author: Serge Vaudenay

Publisher: Springer

Published: 2003-06-30

Total Pages: 369

ISBN-13: 354045537X

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Selected Areas in Cryptology, SAC 2001, held in Toronto, Ontario, Canada in August 2001. The 25 revised full papers presented together with the abstracts of two invited talks were carefully reviewed and selected during two rounds of refereeing and revision. The papers are organized in topical sections on cryptanalysis, Boolean functions, Rijndael, elliptic curves and efficient implementation, public key systems, and protocols and MAC.