Skip to main content
  • Textbook
  • © 2003

Fundamentals of Computer Security

  • Introduces all basic mathematical concepts necessary for further study of secure systems
  • The concepts are presented clearly and illustrated by numerous examples
  • The book can also be used as a reference to quickly learn about terms used in Computer Security
  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 chapters)

  1. Front Matter

    Pages i-xx
  2. Introduction

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 1-10
  3. Background Theory

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 11-67
  4. Private-Key Cryptosystems

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 69-170
  5. Public-Key Cryptosystems

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 171-218
  6. Pseudorandomness

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 219-242
  7. Hashing

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 243-281
  8. Digital Signatures

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 283-305
  9. Authentication

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 307-325
  10. Secret Sharing

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 327-351
  11. Group-Oriented Cryptography

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 353-377
  12. Key Establishment Protocols

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 379-407
  13. Zero-Knowledge Proof Systems

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 409-431
  14. Identification

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 433-458
  15. Intrusion Detection

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 459-497
  16. Electronic Elections and Digital Money

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 499-524
  17. Database Protection and Security

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 525-564
  18. Access Control

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 565-589
  19. Network Security

    • Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
    Pages 591-629
  20. Back Matter

    Pages 631-677

About this book

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

Reviews

From the reviews:

"The goal of the book is to present the basic concepts in computer and network security. … It has 18 chapters, each … concluding with a set of exercises and problems. … the book overviews the most important topics of cryptography and some topics on computer security. It may be used for self-study, as well as a text for undergraduate and postgraduate courses." (Lenka Fibikova, Zentralblatt MATH, Issue 1011, 2003)

Authors and Affiliations

  • Department of Computing, Macquarie University, Sydney, Australia

    Josef Pieprzyk

  • VeriSign INC., Wakefield, USA

    Thomas Hardjono

  • School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia

    Jennifer Seberry

Bibliographic Information

Buy it now

Buying options

eBook USD 49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access