Publisher of Humanities, Social Science & STEM Books

View All Book Series

BOOK SERIES


Chapman & Hall/CRC Cryptography and Network Security Series


15 Series Titles

Per Page
Sort

Display
Secret History The Story of Cryptology

Secret History: The Story of Cryptology

1st Edition

Forthcoming

Craig Bauer
February 10, 2021

The first edition of this award-winning book attracted a wide audience. Secret History is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics ...

Hacking Binary Programs and Exploit Analysis

Hacking Binary Programs and Exploit Analysis

1st Edition

Forthcoming

Adam Aviv
January 15, 2021

This book provides the reader a dynamic educational experience focused on stack based binary exploits. It provides a guide for educators in developing course syllabi and coursework for students. The goal of this book can further the education of important security topics of binary exploits focused ...

Introduction to Modern Cryptography

Introduction to Modern Cryptography

3rd Edition

Forthcoming

Jonathan Katz, Yehuda Lindell
December 21, 2020

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal ...

Discrete Encounters

Discrete Encounters

1st Edition

Craig Bauer
May 21, 2020

Eschewing the often standard dry and static writing style of traditional textbooks, Discrete Encounters provides a refreshing approach to discrete mathematics. The author blends traditional course topics and applications with historical context, pop culture references, and open problems. This book ...

Cryptology Classical and Modern

Cryptology: Classical and Modern

2nd Edition

Richard E. Klima, Richard Klima, Neil P. Sigmon, Neil Sigmon
December 03, 2018

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and ...

Guide to Pairing-Based Cryptography

Guide to Pairing-Based Cryptography

1st Edition

Nadia El Mrabet, Marc Joye
December 08, 2016

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite ...

Group Theoretic Cryptography

Group Theoretic Cryptography

1st Edition

Maria Isabel González Vasco, Rainer Steinwandt
April 01, 2015

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential ...

Introduction to Modern Cryptography

Introduction to Modern Cryptography

2nd Edition

Jonathan Katz, Yehuda Lindell
November 06, 2014

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of ...

Communication System Security

Communication System Security

1st Edition

Lidong Chen, Guang Gong
May 29, 2012

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in ...

Handbook on Soft Computing for Video Surveillance

Handbook on Soft Computing for Video Surveillance

1st Edition

Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena
January 25, 2012

Information on integrating soft computing techniques into video surveillance is widely scattered among conference papers, journal articles, and books. Bringing this research together in one source, Handbook on Soft Computing for Video Surveillance illustrates the application of soft computing ...

Handbook of Financial Cryptography and Security

Handbook of Financial Cryptography and Security

1st Edition

Burton Rosenberg
August 02, 2010

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment ...

Access Control, Security, and Trust A Logical Approach

Access Control, Security, and Trust: A Logical Approach

1st Edition

Shiu-Kai Chin, Susan Beth Older
July 26, 2010

Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use ...

1-12 of 15
AJAX loader