Download Introduction to Information Security (642)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Introduction to Information Security (642)
Reading List
1) General Security
 Bruce Schneier, Applied Cryptography, John Wiley & Sons, 1995.
 Ross Anderson, Security Engineering, Wiley, 2001.
 Neal Koblitz, A Course in Number Theory and Cryptography, Springer
1987.
2) Elliptic Curve Cryptography (ECC)
 Ian Blake, Gadiel Seroussi, and Nigel Smart, Elliptic Curves in
Cryptography, Cambridge University Press, 2002.
3) Database Security
 R. Ramakrishnan, J. Gehrke, Database Management Systems, McGraw Hill,
2003. [Database security in chapter 21]
 S. Castano, M. Fugini, G. Martella, and P. Samarati, Database Security,
Addison-Wesley, 1995.
 Professional books on database security by Oracle.
4) Digital Watermarking
 I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, Morgan
Kaufmann Publishers, 2002.
5) Privacy and Secure Multiparty Computation
 D. Denning, Secure Statistical Databases with Random Sample Queries,
ACM Transactions on Database Systems, 5(3):291-315, 1980.
 Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Journal of
Cryptology, 15(3): 177-206, 2002.
 R. Agarwal and R. Srikant, Privacy-Preserving Data Mining, ACM SIGMOD
International Conference on Management of Data, Dallas, May 2000.
 O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications,
Cambridge University Press, May 10, 2004. [Chapter 7 deals with secure
multi-party computation.]
6) Threshold Cryptography,
 Y.G. Desmedt, Threshold Cryptography, European Transactions on
Telecommunications, 5(4), pages 449-457, July-August, 1994.
 P.S. Gimmel, An Introduction to Threshold Cryptography, CryptoBytes,
volume 2, number 3, 1997.
Related documents