Shopping Cart | Login | Register | Language: English
Anonymous Security Systems and Applications: Requirements and Solutions
Buy Hardcover + Free E-Access
Qty:
$156.00
List Price: $195.00
You Save: $39.00
20% Online Bookstore Discount*
Free Lifetime E-Access*
I will be using e-access as an:
In Stock. Have the hardcover format as soon as Dec. 24 with express shipping*. Free instant online e-access upon order completion.

Anonymous Security Systems and Applications: Requirements and Solutions

Release Date: May, 2012. Copyright © 2012. 265 pages.
ISBN13: 9781466616493|ISBN10: 1466616490|EISBN13: 9781466616509|
DOI: 10.4018/978-1-4666-1649-3
Cite Book

MLA

Tamura, Shinsuke. "Anonymous Security Systems and Applications: Requirements and Solutions." IGI Global, 2012. 1-265. Web. 19 Dec. 2014. doi:10.4018/978-1-4666-1649-3

APA

Tamura, S. (2012). Anonymous Security Systems and Applications: Requirements and Solutions (pp. 1-265). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-1649-3

Chicago

Tamura, Shinsuke. "Anonymous Security Systems and Applications: Requirements and Solutions." 1-265 (2012), accessed December 19, 2014. doi:10.4018/978-1-4666-1649-3

Export Reference

Mendeley
Favorite
Access on Platform
Browse by Subject
Top

Description

As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual’s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers’ lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners.

Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.

Top

Table of Contents and List of Contributors

Search this Book: Reset
Table of Contents
Preface
Shinsuke Tamura
Chapter 1
To understand the importance of secure anonymous system technologies, this chapter introduces communication, electronic payment, cloud computing... Sample PDF
Secure Anonymous Systems and Requirements
$30.00
List Price: $37.50
Chapter 2
As the foundation of all security enhanced systems, encryptions and decryptions are defined, and homomorphic (additive or multiplicative)... Sample PDF
Encryption and Decryption
$30.00
List Price: $37.50
Chapter 3
Integrity is the property of information concerning protection against its unauthorized modifications and forgeries. This chapter discusses bulletin... Sample PDF
Schemes for Digital Signatures
$30.00
List Price: $37.50
Chapter 4
As encryption schemes useful in developing secure anonymous systems, linear equation based encryption, probabilistic, commutative and verifiable... Sample PDF
Encryption Schemes for Anonymous Systems
$30.00
List Price: $37.50
Chapter 5
This chapter summarizes approaches that are adopted in this book to satisfy various requirements of secure anonymous systems listed in the 1st... Sample PDF
Approaches to Developing Secure Anonymous Systems
$30.00
List Price: $37.50
Chapter 6
This chapter discusses schemes to confirm that data owned by anonymous entities are legitimate ones, in other words, to protect data owned by... Sample PDF
Integrity of Anonymous Data
$30.00
List Price: $37.50
Chapter 7
Anonymous Communication  (pages 101-123)
Schemes of anonymous communication enable entities to send or receive their messages without disclosing their identities to others including... Sample PDF
Anonymous Communication
$30.00
List Price: $37.50
Chapter 8
This chapter introduces schemes for anonymous statistics calculations, in which an entity or a set of entities calculate functions of data owned by... Sample PDF
Anonymous Statistics Calculation
$30.00
List Price: $37.50
Chapter 9
As the first application of secure anonymous systems, after reviewing conventional schemes, this chapter develops anonymous token, ITL, and ID list... Sample PDF
Anonymous Authentication Systems
$30.00
List Price: $37.50
Chapter 10
An anonymous credit card system and an electronic cash (e-cash) system are developed while exploiting ITLs and anonymous tag based credentials. Both... Sample PDF
Electronic Payment Systems
$30.00
List Price: $37.50
Chapter 11
As elements that constitute electronic procurement systems, anonymous auction, object delivery, and object monitoring systems are developed based on... Sample PDF
Electronic Procurement Systems
$30.00
List Price: $37.50
Chapter 12
As one of applications in electronic governance, this chapter develops an electronic voting (e-voting) system. After discussing requirements for... Sample PDF
Electronic Governance Systems
$30.00
List Price: $37.50
Top

Topics Covered

  • Anonymous Auction System Development
  • Anonymous Authentication
  • Anonymous Service Components
  • Anonymous Token-Based Schemes
  • Classification of Encryption Algorithms
  • e-voting systems and civic engagement
  • Encryption and Decryption
  • Encryption Schemes for Anonymous Systems
  • Enhanced Symmetric key Based Mix-net (ESEBM)
  • Hash, Mac and Digital Signatures
Top

Author(s)/Editor(s) Biography

Shinsuke Tamura received the B.S., M.S. and Dr.(Eng.) degrees in Control Engineering from Osaka University in 1970, 1972 and 1991, respectively. During 1972 to 2001 he worked for Toshiba Corporation, and had been developing information systems for various applications including mechanical CAD systems, system engineering tools, manufacturing systems, power systems, railway control systems, and building, factory and office automation systems. He is currently a professor of Graduate School of Engineering, University of Fukui. His current research interests include distributed system architecture, system development methods, information security, path planning algorithms (for manipulators), and manufacturing scheduling algorithms.