Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Introduction to Information Security (642) Reading List 1) General Security Bruce Schneier, Applied Cryptography, John Wiley & Sons, 1995. Ross Anderson, Security Engineering, Wiley, 2001. Neal Koblitz, A Course in Number Theory and Cryptography, Springer 1987. 2) Elliptic Curve Cryptography (ECC) Ian Blake, Gadiel Seroussi, and Nigel Smart, Elliptic Curves in Cryptography, Cambridge University Press, 2002. 3) Database Security R. Ramakrishnan, J. Gehrke, Database Management Systems, McGraw Hill, 2003. [Database security in chapter 21] S. Castano, M. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995. Professional books on database security by Oracle. 4) Digital Watermarking I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, 2002. 5) Privacy and Secure Multiparty Computation D. Denning, Secure Statistical Databases with Random Sample Queries, ACM Transactions on Database Systems, 5(3):291-315, 1980. Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Journal of Cryptology, 15(3): 177-206, 2002. R. Agarwal and R. Srikant, Privacy-Preserving Data Mining, ACM SIGMOD International Conference on Management of Data, Dallas, May 2000. O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications, Cambridge University Press, May 10, 2004. [Chapter 7 deals with secure multi-party computation.] 6) Threshold Cryptography, Y.G. Desmedt, Threshold Cryptography, European Transactions on Telecommunications, 5(4), pages 449-457, July-August, 1994. P.S. Gimmel, An Introduction to Threshold Cryptography, CryptoBytes, volume 2, number 3, 1997.