MARC details
000 -LEADER |
fixed length control field |
02062cam a2200337Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
TR-AnTOB |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240419084120.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
ta |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
030811s2004 njua b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0130669431 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
HPG |
Transcribing agency |
HPG |
Modifying agency |
IXA |
-- |
GHG |
-- |
BGZ |
-- |
TR-AnTOB |
Language of cataloging |
eng |
Description conventions |
rda |
041 0# - LANGUAGE CODE |
Language code of text/sound track or separate title |
İngilizce |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
QA76.9.A25 |
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
M36 2004 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Mao, Wenbo |
9 (RLIN) |
128678 |
Relator term |
author |
245 10 - TITLE STATEMENT |
Title |
Modern cryptography : |
Remainder of title |
theory and practice / |
Statement of responsibility, etc. |
Wenbo Mao. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Upper Saddle River, NJ : |
Name of producer, publisher, distributor, manufacturer |
Prentice Hall PTR, |
Date of production, publication, distribution, manufacture, or copyright notice |
2004. |
|
Date of production, publication, distribution, manufacture, or copyright notice |
©2004 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxviii, 707 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
Media type code |
n |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
Carrier type code |
nc |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
pt. 1. Introduction. Beginning with a simple communication game -- Wrestling between safeguard and attack -- pt. 2. Mathematical foundations. Probability and information theory -- Computational complexity -- Algebraic foundations -- Number theory -- pt. 3. Basic cryptographic techniques. Encryption: symmetric techniques -- Encryption: asymmetric techniques -- In an ideal world: bit security of the basic public-key cryptographic functions -- Data integrity techniques -- pt. 4. Authentication. Authentication protocols: principles -- Authentication protocols: the real world -- Authentication framework for public-key cryptography -- pt. 5. Formal approaches to security establishment. Formal and strong security definitions for public-key cryptosystems -- Provably secure and efficient public-key cryptosystems -- Strong and provable security for digital signatures -- Formal methods for authentication protocols analysis -- pt. 6. Cryptographic protocols. Zero-knowlege protocols -- Returning to "coin flipping over telephone" -- Afterremark. |
590 ## - LOCAL NOTE (RLIN) |
Local note |
ORDER 2004 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography. |
|
Topical term or geographic name entry element |
Computers |
General subdivision |
Access control |
9 (RLIN) |
21454 |
|
Topical term or geographic name entry element |
Data transmission systems |
9 (RLIN) |
1560 |
|
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures |
9 (RLIN) |
47 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Book |