Item Successfully Added to Cart
An error was encountered while trying to add the item to the cart. Please try again.
OK
Please make all selections above before adding to cart
OK
Share this page via the icons above, or by copying the link below:
Copy To Clipboard
Successfully Copied!
Distributed Computing and Cryptography
 
A co-publication of the AMS, DIMACS, and Association for Computing Machinery
Distributed Computing and Cryptography
Hardcover ISBN:  978-0-8218-6590-3
Product Code:  DIMACS/2
List Price: $78.00
MAA Member Price: $70.20
AMS Member Price: $62.40
Distributed Computing and Cryptography
Click above image for expanded view
Distributed Computing and Cryptography
A co-publication of the AMS, DIMACS, and Association for Computing Machinery
Hardcover ISBN:  978-0-8218-6590-3
Product Code:  DIMACS/2
List Price: $78.00
MAA Member Price: $70.20
AMS Member Price: $62.40
  • Book Details
     
     
    DIMACS - Series in Discrete Mathematics and Theoretical Computer Science
    Volume: 21991; 262 pp
    MSC: Primary 68; 94; Secondary 03

    This book, the second volume in the DIMACS book series and published jointly with the Association for Computing Machinery, contains the proceedings of a workshop held in Princeton, New Jersey, in October 1989. The workshop, which drew seventy-four participants from five countries, addressed a wide range of practical and theoretical questions arising in the overlap of distributed computation and cryptography. In addition to fifteen papers based on formal talks presented at the workshop, this volume also contains two contributed papers on related topics, and an extensive summary of informal discussions that took place during the workshop, including some open questions raised.

    The book requires basic background in computer science and either a familiarity with the notation and terminology of distributed computing and cryptography, or a willingness to do some background reading. Students, researchers, and engineers interested in the theoretical and practical aspects of distributed computing and cryptography will appreciate the overview the book provides.

    Co-published with the Center for Discrete Mathematics and Theoretical Computer Science beginning with Volume 8. Volumes 1–7 were co-published with the Association for Computer Machinery (ACM).

  • Table of Contents
     
     
    • Chapters
    • Open questions, talk abstracts, and summary of discussions
    • Formal definitions for secure distributed protocols
    • Perfect privacy for two-party protocols
    • On the structure of secret key exchange protocols
    • Privacy-enhanced electronic mail
    • Program result checking against adaptive programs and in cryptographic settings
    • The scope of a logic of authentication
    • Secure policy enforcement in internetworks
    • On expected polynomial time simulation of zero knowledge protocols
    • Cryptographic protection of databases and software
    • Secret bit transmission using a random deal of cards
    • Security against replay chosen-ciphertext attack
    • New directions in testing
    • Towards a theory of cryptographic systems: A critique of crypto-complexity
    • Feedback in discrete communication
    • On necessary conditions for secure distributed computation
    • Secure IX network
    • Reasoning about cryptographic protocols
  • Requests
     
     
    Review Copy – for publishers of book reviews
    Accessibility – to request an alternate format of an AMS title
Volume: 21991; 262 pp
MSC: Primary 68; 94; Secondary 03

This book, the second volume in the DIMACS book series and published jointly with the Association for Computing Machinery, contains the proceedings of a workshop held in Princeton, New Jersey, in October 1989. The workshop, which drew seventy-four participants from five countries, addressed a wide range of practical and theoretical questions arising in the overlap of distributed computation and cryptography. In addition to fifteen papers based on formal talks presented at the workshop, this volume also contains two contributed papers on related topics, and an extensive summary of informal discussions that took place during the workshop, including some open questions raised.

The book requires basic background in computer science and either a familiarity with the notation and terminology of distributed computing and cryptography, or a willingness to do some background reading. Students, researchers, and engineers interested in the theoretical and practical aspects of distributed computing and cryptography will appreciate the overview the book provides.

Co-published with the Center for Discrete Mathematics and Theoretical Computer Science beginning with Volume 8. Volumes 1–7 were co-published with the Association for Computer Machinery (ACM).

  • Chapters
  • Open questions, talk abstracts, and summary of discussions
  • Formal definitions for secure distributed protocols
  • Perfect privacy for two-party protocols
  • On the structure of secret key exchange protocols
  • Privacy-enhanced electronic mail
  • Program result checking against adaptive programs and in cryptographic settings
  • The scope of a logic of authentication
  • Secure policy enforcement in internetworks
  • On expected polynomial time simulation of zero knowledge protocols
  • Cryptographic protection of databases and software
  • Secret bit transmission using a random deal of cards
  • Security against replay chosen-ciphertext attack
  • New directions in testing
  • Towards a theory of cryptographic systems: A critique of crypto-complexity
  • Feedback in discrete communication
  • On necessary conditions for secure distributed computation
  • Secure IX network
  • Reasoning about cryptographic protocols
Review Copy – for publishers of book reviews
Accessibility – to request an alternate format of an AMS title
Please select which format for which you are requesting permissions.