ESORICS Proceedings wski, (Eds.), Springer Verlag, , Kryptografia wski, W.-B. Strothmann, Wydawnictwo RM, [7] Kuriata E. ‘Teoria informacji i kodowania”. Oficyna Wydawnicza Politechniki Zielonogórskiej [8] Kutyłowski M., Strothmann W. B. Kryptografia. [7] Kutyłowski M., Strothmann W.B., Kryptografia. Teoria i praktyka zabezpieczania systemów komputerowych, Oficyna Wydawnicza Read Me, Warszawa, ().

Author: Dinos Mushakar
Country: New Zealand
Language: English (Spanish)
Genre: Travel
Published (Last): 7 November 2016
Pages: 349
PDF File Size: 11.48 Mb
ePub File Size: 10.86 Mb
ISBN: 665-1-65251-956-3
Downloads: 68108
Price: Free* [*Free Regsitration Required]
Uploader: Kazragrel

Mathematical background, number theory, prime number generation. Java remote method invocation is an implementation of remote procedure call in object oriented environment.

Foundations of Cryptography (07 74 17)

PerlmanMike Speciner Prentice Hall series in computer networking and…. From This Paper Figures, tables, and topics from this paper. Java remote method invocation Subroutine Remote procedure call. Familiarize students with private key cryptography. These enhancements are called secure RMI.

Kerberos – the definitive guide: The student is able to use in practice specific digital signature schemes. Kerberos and Java authentication and authorization service, one can greatly improve Java remote method invocation security. By using additional technologies: Overview of digital signature schemes. References Publications referenced by this paper.


Solution of some number of test problems on appropriate level of difficulty during 2 tests learning outcomes Request for comments Theoretical Fundaments of Computer Sciences 07 60 Randomness recommendations for security. However, its security level can be regarded as very low. The student is able to implement the protocols associated with the signatures.

Classic techniques of cryptography: Topics Discussed in This Paper.

Read Me, Warszawa, W teorii i praktyce. Skip to search form Skip to main content. Java remote method invocation Search for additional papers on this topic.

In order to pass the subject, student must solve appropriate problems. Fundamental of probability and statistic 07 20 It is shown that by using secure RMI three conditions kryptografiw secure communication can be satisfied, namely: By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy PolicyTerms of Serviceand Dataset License. Distributed Operating Systems Andrew S.

Discussion of the protocols associated with signatures. Special algorithms for protocols.


Wyklad Kryptografia, Miroslaw Kutylowski

After the course the students will have knowledge of modern methods and basics of cryptography. The student is able to use cryptographic methods with a private key The student is able to select the appropriate keys and apply cryptography methods with a public key. Showing of 13 references.