Easily accessible to professionals in all fields who are interested in a particular aspect of the broad field of computer security or cryptology but who lack the time to study one of the many technically-detailed books on the subject
Contains updated entries from second edition when needed to keep pace with the advancement of state of the art.
Expanded coverage with special emphasis to the area of privacy
Contains comprehensive view and includes coverage of several newer topics
This is a preview of subscription content, access via your institution.
Table of contents (379 entries)
About this book
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas.
The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.
The Encyclopedia will be available as a printed volume when it is finished. In the meantime, it is being made available as an online reference work now; it will be updated regularly as more articles arrive and are finalized for publication.
From the reviews:
"Readers of this book will first be impressed by its size and high-quality binding. The first impression suggests a monumental piece of work … . Information security specialists will benefit by having this concise reference. … The real strength of the book is that it is an excellent reference; taking this reference along while traveling would be great … . this book is the best work reference available, and thus a must-have for all researchers and writers working with information technology (IT) security." (Edgar R. Weippl, Computing Reviews, May, 2006)
Editors and Affiliations
Center for Secure Information Systems, George Mason University, Fairfax, VA, USA
University of Milan, Milan, Italy
Google Inc, New York, USA
About the editors
Sushil Jajodia is University Professor, BDM International Professor, and the founding director of Center for Secure Information Systems in the Volgenau School of Engineering at the George Mason University, Fairfax, Virginia. He is also the director of the NSF I/UCRC Center for Cybersecurity Analytics and Automation (now in Phase II). Before coming to George Mason, he held permanent positions at the National Science Foundation; Naval Research Laboratory, Washington; and University of Missouri, Columbia. He has also been a visiting professor at the University of Milan, Sapienza University of Rome, Cambridge University, King's College London, Paris Dauphine University, and Imperial College.
Dr. Jajodia received his PhD from the University of Oregon, Eugene. His research interests include security, privacy, databases, and distributed systems. He has authored or coauthored seven books, edited 52 books and conference proceedings, and published more than 500 technical papers in the refereed journals and conference proceedings. Five of his books have been translated in Chinese. He is also a holder of 23 patents. His current research sponsors are the Army Research Office, Office of Naval Research, National Security Agency, National Science Foundation, Northrop Grumman Corporation, and Intelligent Automation, Inc.
Dr. Jajodia was elected a fellow of IEEE in January, 2013. His contributions to the field have been recognized with several awards: IFIP TC 11 Kristian Beckman Award (1996), Volgenau School of Engineering Outstanding Research Faculty Award (2000), ACM SIGSAC Outstanding Contributions Award (2008), IFIP WG 11.3 Outstanding Research Contributions Award (2011), ESORICS Outstanding Research Award (2015), Federal Information Systems Security Educators’ Association (FISSEA) Educator of the Year Award (2016 ), IEEE Computer Society Technical Achievement Award (2016), and IEEE Computer Society W. Wallace McDowell Award (2020). He was recognized for the most accepted papers at the 30th anniversary of the IEEE Symposium on Security and Privacy. His h-index is 106 and Erdos number is 2. The URL for his web page is http://csis.gmu.edu/jajodia.
Pierangela Samarati is a Professor at the Department of Computer Science of the Università degli Studi di Milano, Italy. Her main research interests are on data and applications security and privacy, especially in emerging scenarios. She has coordinated and participated in several projects involving different aspects of information protection. She has published more than 280 peer-reviewed articles in international journals, conference proceedings, and book chapters.She has been Computer Scientist in the Computer Science Laboratory at SRI, CA (USA). She has been a visiting researcher at the Computer Science Department of Stanford University, CA (USA), and at the Center for Secure Information Systems of George Mason University, VA (USA).
She is the chair of the IEEE Systems Council Technical Committee on Security and Privacy in Complex Information Systems (TCSPCIS), of the ERCIM Security and Trust Management Working Group (STM), and of the ACM Workshop on Privacy in the Electronic Society (WPES). She has been member of several scientific and technical committees and boards, also serving as chair. She is ACM Distinguished Scientist (named 2009) and IEEE Fellow (named 2012).She has received the ESORICS Outstanding Research Award (2018), the IEEE Computer Society Technical Achievement Award (2016), the IFIP WG 11.3 Outstanding Research Contributions Award (2012), and the IFIP TC11 Kristian Beckman Award (2008). She has been Editor in Chief for the Journal of Computer Security. She has been serving as Associate Editor of several journals, and as General Chair, Program Chair, and program committee member of several international conferences. The URL for her web page is http://www.di.unimi.it/samarati.
Moti Yung is currently a Security and Privacy Research Scientist with Google. He got his PhD from Columbia University. Previously, he was with IBM Research, Certco, RSA Laboratories, and Snap. He is also an adjunct senior research faculty at Columbia, where he has co-advised and worked with numerous PhD students. Yung’s contributions to research and development treat science and technology holistically: from the theoretical mathematical foundations, via conceptual mechanisms which typify computer science, to participation in developments of industrial products. Specifically: his work has been predicting future or emerging needs, employing cryptographic novel methods in general systems, and analyzing coming threats. These led to basic theoretical and applied notions, like: malicious cryptography (including ransomware attacks, and cryptosystems subversion known as kleptography); entity authentication technologies, including concurrent sessions in protocols; strong (chosen ciphertext secure) encryption; distributed cryptosystems for improving trust; digital signatures from simplified cryptography (related to hash-based signature); and numerous privacy preserving cryptographic protocols. His industrial work gave rise to new mechanisms. These include: public-key based second factor authentication device; numerous massively large scale (web and mobile) encryption schemes; large scale secure computation protocols for privacy preserving data analytics (perhaps the first such mainstream industrial application); and an ephemeral identities layer for beacons’ privacy, and for the exposure notification smartphone API.
Dr. Yung is a fellow of the IEEE, the Association for Computing Machinery (ACM), the International Association for Cryptologic Research (IACR), and the European Association for Theoretical Computer Science (EATCS). In 2010 he gave the IACR Distinguished Lecture. He is the recipient of the 2014 ACM’s SIGSAC Outstanding Innovation award, and the 2014 ESORICS Outstanding Research award. For specific papers he received test-of-time awards in the 2020 IEEE Symposium on Security and Privacy for work published in 1996, and the 2020 IACR Public Key Cryptography conference for work published in 1998. In industry he got an IBM Outstanding Innovation award, a Google OC award, and a Google founders’ award. The URL of his webpage is http://www.cs.columbia.edu/~moti/
Book Title: Encyclopedia of Cryptography, Security and Privacy
Editors: Sushil Jajodia, Pierangela Samarati, Moti Yung
Publisher: Springer Berlin, Heidelberg
eBook Packages: Springer Reference Computer Sciences, Reference Module Computer Science and Engineering
Number of Pages: XIII, 2000
Topics: Data Structures and Information Theory, Cryptology, Coding and Information Theory, Mathematical and Computational Engineering Applications, Applications of Mathematics, Applied Dynamical Systems