Stamp, Mark2018-11-142018-11-142006200613 978-0-471-73848-0http://196.43.179.3:8080/xmlui/handle/123456789/11391.INTRODUCTION; 2.CRYPTO; 3.SYMMETRIC KEY CRYPTO; 4.PUBLIC KEY CRYPTO; 5.HASH FUNCTIONS AND OTHER TOPICS; 6.ADVANCED CRYPTANALYSIS; 7.AUTHENTICATION; 8.AUTHORIZATION; 9.SIMPLE AUTHENTICATION PROTOCOLS; 10.REAL-WORLD SECURITY PROTOCOLS...en-USInformation security: principles and practiceBook