Overview
- Unique introduction of homomorphic encryption presented in a very practical manner
- Includes supplementary material: sn.pub/extras
Part of the book series: SpringerBriefs in Computer Science (BRIEFSCOMPUTER)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (6 chapters)
Keywords
About this book
Reviews
“This brief, 126-page book comprehensively presents various homomorphic encryption algorithms and their applications nicely. … I would recommend this book as a reference for senior undergraduate and graduate students. Researchers and practitioners working in cryptography will also find it useful.” (S. Ramakrishnan, Computing Reviews, May, 2015)
“This book presents the basic homomorphic encryption techniques and their applications. … It is best suited for undergraduate students in computer science or mathematics with a basic background in cryptography … . Overall, I can recommend this book as a general reference for possible independent study.” (Burkhard Englert, computing Reviews, April, 2015)
“This book presents basic homomorphic encryption techniques and applications. … This book is designed for undergraduate- or graduate-level courses in computer science or mathematics, as a general introduction suitable for self-study, and as a reference for students, researchers, and practitioners.” (Jörg Desel, zbMATH 1308.68014, 2015)
Authors and Affiliations
Bibliographic Information
Book Title: Homomorphic Encryption and Applications
Authors: Xun Yi, Russell Paulet, Elisa Bertino
Series Title: SpringerBriefs in Computer Science
DOI: https://doi.org/10.1007/978-3-319-12229-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Xun Yi, Russell Paulet, Elisa Bertino 2014
Softcover ISBN: 978-3-319-12228-1Published: 20 November 2014
eBook ISBN: 978-3-319-12229-8Published: 06 November 2014
Series ISSN: 2191-5768
Series E-ISSN: 2191-5776
Edition Number: 1
Number of Pages: XII, 126
Number of Illustrations: 9 b/w illustrations, 14 illustrations in colour
Topics: Cryptology, Applications of Graph Theory and Complex Networks, Mathematical Applications in Computer Science, Data Mining and Knowledge Discovery, Security Science and Technology