Various cryptographic protocols
-
Data nowadays are being extensively stored in the cloud, and users also need to trust the cloud servers/ authorities that run powerful applications. Collecting user data, combined with powerful tools (e.g., machine learning), can come with a huge risk of mass surveillance or of undesirable data-driven strategies for profit making, while ignoring users’ needs.
23p spiritedaway36 25-11-2021 22 5 Download
-
Knowledge of number theory and abstract algebra are pre–requisites for any engineer designing a secure internet–based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work. I
426p bookstore_1 10-01-2013 55 12 Download