Trends in Data Protection and Encryption Technologies.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer,, 2023.
©2023.
Year of Publication:2023
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (255 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 50030670648
ctrlnum (MiAaPQ)50030670648
(Au-PeEL)EBL30670648
(OCoLC)1393224341
collection bib_alma
record_format marc
spelling Mulder, Valentin.
Trends in Data Protection and Encryption Technologies.
1st ed.
Cham : Springer, 2023.
©2023.
1 online resource (255 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Intro -- Foreword by Quentin Ladetto -- Foreword by Florian Schütz -- Preface -- Acknowledgements -- Contents -- List of Contributors -- Part I Encryption Foundations -- 1 One-Time Pad -- 1.1 Introduction -- 1.2 Analysis -- 1.2.1 Definition -- 1.2.2 Trends -- 1.3 Consequences for Switzerland -- 1.3.1 Implementation Possibilities -- 1.4 Conclusion -- References -- 2 Symmetric Cryptography -- 2.1 Introduction -- 2.2 Analysis -- 2.2.1 Definition -- 2.2.2 Trends -- 2.3 Consequences for Switzerland -- 2.3.1 Implementation Possibilities -- 2.4 Conclusion -- References -- 3 Asymmetric Encryption -- 3.1 Introduction -- 3.2 Analysis -- 3.2.1 Definition -- 3.2.2 Trends -- 3.3 Consequences for Switzerland -- 3.3.1 Implementation Possibilities: Make or Buy -- 3.3.2 Variation and Recommendation -- 3.4 Conclusion -- References -- 4 Key Management -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Definition -- 4.2.1.1 Key Creation -- 4.2.1.2 Key Storage -- 4.2.1.3 Key Distribution -- 4.2.1.4 Key Usage -- 4.2.2 Trends -- 4.3 Consequences for Switzerland -- 4.3.1 Implementation Possibilities: Make or Buy -- 4.3.2 Variations and Recommendation -- 4.4 Conclusion -- References -- 5 Hash Functions -- 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Definition -- 5.2.2 Trends -- 5.3 Consequences for Switzerland -- 5.3.1 Implementation Possibilities -- 5.4 Conclusion -- References -- 6 Zero-Knowledge Proof -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Definition -- 6.2.2 Trends -- 6.3 Consequences for Switzerland -- 6.3.1 Public Sector -- 6.3.2 Private Sector -- 6.3.3 Civil Society -- 6.3.4 Implementation Possibilities: Make or Buy -- 6.3.5 Variation and Recommendation -- 6.4 Conclusion -- References -- 7 Random Number Generator -- 7.1 Introduction -- 7.2 Analysis -- 7.2.1 Definition -- 7.2.2 Trends -- 7.3 Consequences for Switzerland.
7.3.1 Implementation Possibilities: Make or Buy -- 7.3.2 Variation and Recommendation -- 7.4 Conclusion -- References -- 8 Homomorphic Encryption -- 8.1 Introduction -- 8.2 Definition and Analysis -- 8.2.1 Trends -- 8.3 Consequences for Switzerland -- 8.3.1 Implementation Possibilities: Make or Buy -- 8.3.2 Variations and Recommendation -- 8.4 Conclusion -- References -- 9 Quantum Key Distribution -- 9.1 Introduction -- 9.2 Analysis -- 9.2.1 Definition -- 9.2.2 Trends -- 9.3 Consequences for Switzerland -- 9.3.1 Implementation Possibilities: Make or Buy -- 9.3.2 Variations and Recommendation -- 9.4 Conclusion -- References -- 10 Post-quantum Cryptography -- 10.1 Introduction -- 10.2 Analysis -- 10.2.1 Definition -- 10.2.2 Trends -- 10.3 Consequences for Switzerland -- 10.3.1 Implementation Possibilities: Make or Buy -- 10.3.2 Variations and Recommendation -- 10.4 Conclusion -- References -- Part II Low-Level Applications -- 11 Functional Encryption -- 11.1 Introduction -- 11.2 Analysis -- 11.2.1 Definition -- 11.2.2 Trends -- 11.3 Consequences for Switzerland -- 11.3.1 Implementation Possibilities: Make or Buy -- 11.3.2 Variations and Recommendation -- 11.4 Conclusion -- References -- 12 Identity-Based Cryptography -- 12.1 Introduction -- 12.2 Analysis -- 12.2.1 Definition -- 12.2.2 Trends -- 12.3 Consequences for Switzerland -- 12.3.1 Implementation Possibilities: Make or Buy -- 12.3.2 Variations and Recommendation -- 12.4 Conclusion -- References -- 13 Multi-Party Threshold Cryptography -- 13.1 Introduction -- 13.2 Analysis -- 13.2.1 Definition -- 13.2.2 Trends -- 13.3 Consequences for Switzerland -- 13.3.1 Implementation Possibilities: Make or Buy -- 13.3.2 Variations and Recommendation -- 13.4 Conclusion -- References -- 14 Searchable Symmetric Encryption -- 14.1 Introduction -- 14.2 Analysis -- 14.2.1 Definition -- 14.2.2 Trends.
14.3 Consequences for Switzerland -- 14.3.1 Implementation Possibilities: Make or Buy -- 14.3.2 Variations and Recommendation -- 14.4 Conclusion -- References -- 15 Digital Signature -- 15.1 Introduction -- 15.2 Analysis -- 15.2.1 Definition -- 15.2.2 Trends -- 15.3 Consequences for Switzerland -- 15.3.1 Implementation Possibilities: Make or Buy -- 15.3.1.1 Distinction from Electronic Signature -- 15.3.1.2 Code Signing -- 15.4 Conclusion -- References -- 16 Hardware Security Module -- 16.1 Introduction -- 16.2 Analysis -- 16.2.1 Definition -- 16.2.2 Trends -- 16.3 Consequences for Switzerland -- 16.3.1 Maturity -- 16.3.2 Recommendation and Options -- 16.4 Conclusion -- References -- 17 Secure Multi-Party Computation -- 17.1 Introduction -- 17.2 Analysis -- 17.2.1 Definition -- 17.2.2 Trends -- 17.3 Consequences for Switzerland -- 17.3.1 Implementation Possibilities: Make or Buy -- 17.3.2 Variations and Recommendation -- 17.4 Conclusion -- References -- Part III High-Level Applications -- 18 Trusted Execution Environment -- 18.1 Introduction -- 18.2 Analysis -- 18.2.1 Definition -- 18.2.2 Trends -- 18.2.2.1 Application on Mobile Phones -- 18.2.2.2 Security in Cloud Data Processing -- 18.2.2.3 Data Protection Laws -- 18.2.2.4 Cryptocurrency Usage -- 18.2.2.5 Demand -- 18.2.2.6 Actors -- 18.2.2.7 Research -- 18.3 Consequences for Switzerland -- 18.3.1 Maturity -- 18.3.1.1 Recommendations and Options -- 18.4 Conclusion -- References -- 19 Confidential Computing -- 19.1 Introduction -- 19.2 Analysis -- 19.2.1 Definition -- 19.2.2 Trends -- 19.3 Consequences for Switzerland -- 19.3.1 Implementation Possibilities: Make or Buy -- 19.4 Conclusion -- References -- 20 Hardware Acceleration -- 20.1 Introduction -- 20.2 Analysis -- 20.2.1 Definition -- 20.2.2 Trends -- 20.3 Consequences for Switzerland -- 20.3.1 Implementation Possibilities: Make or Buy.
20.3.2 Variations and Recommendation -- 20.4 Conclusion -- References -- 21 Secure Operating System -- 21.1 Introduction -- 21.2 Analysis -- 21.2.1 Definition -- 21.2.2 Trends -- 21.3 Consequences for Switzerland -- 21.3.1 Implementation Possibilities: Make or Buy -- 21.4 Conclusion -- References -- 22 Biometrics -- 22.1 Introduction -- 22.2 Analysis -- 22.2.1 Definition -- 22.2.2 Trends -- 22.3 Consequences for Switzerland -- 22.3.1 Implementation Possibilities: Make or Buy -- 22.3.2 Variation and Recommendation -- 22.4 Conclusion -- References -- 23 Electronic Voting -- 23.1 Introduction -- 23.2 Analysis -- 23.2.1 Definition -- 23.2.2 Trends -- 23.3 Consequences for Switzerland -- 23.3.1 Implementation Possibilities: Make or Buy -- 23.3.2 Variations and Recommendation -- 23.4 Conclusion -- References -- 24 Data in Transit Security -- 24.1 Introduction -- 24.2 Analysis -- 24.2.1 Definition -- 24.2.2 Trends -- 24.3 Consequences for Switzerland -- 24.3.1 Implementation Possibilities: Make or Buy -- 24.4 Conclusion -- References -- 25 Blockchain -- 25.1 Introduction -- 25.2 Analysis -- 25.2.1 Definition -- 25.2.2 Trends -- 25.3 Consequences for Switzerland -- 25.3.1 Implementation Possibilities: Make or Buy -- 25.3.2 Use Cases -- 25.4 Conclusion -- References -- 26 Tunneling and VPN -- 26.1 Introduction -- 26.2 Analysis -- 26.2.1 Definition -- 26.2.2 Trends -- 26.3 Consequences for Switzerland -- 26.3.1 Implementation Possibilities: Make or Buy -- 26.3.2 Variation and Recommendation -- 26.4 Conclusion -- References -- Part IV Data Protection -- 27 Differential Privacy -- 27.1 Introduction -- 27.2 Analysis -- 27.2.1 Definition -- 27.2.2 Trends -- 27.3 Consequences for Switzerland -- 27.3.1 Implementation Possibilities: Make or Buy -- 27.4 Conclusion -- References -- 28 Digital Rights Management -- 28.1 Introduction -- 28.2 Analysis -- 28.2.1 Definition.
28.2.2 Trends -- 28.3 Consequences for Switzerland -- 28.3.1 Implementation Possibilities: Make or Buy -- 28.3.2 Variation and Recommendation -- 28.4 Conclusion -- References -- 29 Authentication -- 29.1 Introduction -- 29.2 Analysis -- 29.2.1 Definition -- 29.2.2 Trends -- 29.3 Consequences for Switzerland -- 29.3.1 Implementation Possibilities: Make or Buy -- 29.4 Conclusion -- References -- Part V Use-Cases -- 30 Secure Media -- 30.1 Introduction -- 30.2 Analysis -- 30.2.1 Definition -- 30.2.2 Trends -- 30.3 Consequences for Switzerland -- 30.3.1 Implementation Possibilities: Make or Buy -- 30.3.2 Variations and Recommendation -- 30.4 Conclusion -- References -- 31 Secure Positioning and Localization -- 31.1 Introduction -- 31.2 Analysis -- 31.2.1 Definition -- 31.2.2 Trends -- 31.3 Consequences for Switzerland -- 31.3.1 Implementation Possibilities: Make or Buy -- 31.3.2 Variations and Recommendation -- 31.4 Conclusion -- References -- 32 Secure Payment -- 32.1 Introduction -- 32.2 Analysis -- 32.2.1 Definition -- 32.2.2 Trends -- 32.3 Consequences for Switzerland -- 32.3.1 Implementation Possibilities: Make or Buy -- 32.3.2 Variation and Recommendation -- 32.4 Conclusion -- References -- 33 Disk, File and Database Encryption -- 33.1 Introduction -- 33.2 Analysis -- 33.3 Definition -- 33.3.1 Full Disk Encryption (FDE) -- 33.3.2 File-Based Encryption (FBE) -- 33.3.3 Manual File Encryption -- 33.3.4 Database Encryption (DBE) -- 33.4 Security Considerations -- 33.4.1 Encryption Algorithms -- 33.4.2 Key Management -- 33.4.3 Coercion -- 33.5 OS Examples -- 33.6 Trends -- 33.7 Consequences for Switzerland -- 33.8 Conclusion -- References -- 34 WEB3 -- 34.1 Introduction -- 34.2 Analysis -- 34.2.1 Definition -- 34.2.2 Technologies -- 34.2.3 Risks -- 34.2.4 Trends -- 34.3 Consequences for Switzerland -- 34.3.1 Adoption and Efficacy -- 34.4 Conclusion.
References.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Mermoud, Alain.
Lenders, Vincent.
Tellenbach, Bernhard.
Print version: Mulder, Valentin Trends in Data Protection and Encryption Technologies Cham : Springer,c2023 9783031333859
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30670648 Click to View
language English
format eBook
author Mulder, Valentin.
spellingShingle Mulder, Valentin.
Trends in Data Protection and Encryption Technologies.
Intro -- Foreword by Quentin Ladetto -- Foreword by Florian Schütz -- Preface -- Acknowledgements -- Contents -- List of Contributors -- Part I Encryption Foundations -- 1 One-Time Pad -- 1.1 Introduction -- 1.2 Analysis -- 1.2.1 Definition -- 1.2.2 Trends -- 1.3 Consequences for Switzerland -- 1.3.1 Implementation Possibilities -- 1.4 Conclusion -- References -- 2 Symmetric Cryptography -- 2.1 Introduction -- 2.2 Analysis -- 2.2.1 Definition -- 2.2.2 Trends -- 2.3 Consequences for Switzerland -- 2.3.1 Implementation Possibilities -- 2.4 Conclusion -- References -- 3 Asymmetric Encryption -- 3.1 Introduction -- 3.2 Analysis -- 3.2.1 Definition -- 3.2.2 Trends -- 3.3 Consequences for Switzerland -- 3.3.1 Implementation Possibilities: Make or Buy -- 3.3.2 Variation and Recommendation -- 3.4 Conclusion -- References -- 4 Key Management -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Definition -- 4.2.1.1 Key Creation -- 4.2.1.2 Key Storage -- 4.2.1.3 Key Distribution -- 4.2.1.4 Key Usage -- 4.2.2 Trends -- 4.3 Consequences for Switzerland -- 4.3.1 Implementation Possibilities: Make or Buy -- 4.3.2 Variations and Recommendation -- 4.4 Conclusion -- References -- 5 Hash Functions -- 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Definition -- 5.2.2 Trends -- 5.3 Consequences for Switzerland -- 5.3.1 Implementation Possibilities -- 5.4 Conclusion -- References -- 6 Zero-Knowledge Proof -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Definition -- 6.2.2 Trends -- 6.3 Consequences for Switzerland -- 6.3.1 Public Sector -- 6.3.2 Private Sector -- 6.3.3 Civil Society -- 6.3.4 Implementation Possibilities: Make or Buy -- 6.3.5 Variation and Recommendation -- 6.4 Conclusion -- References -- 7 Random Number Generator -- 7.1 Introduction -- 7.2 Analysis -- 7.2.1 Definition -- 7.2.2 Trends -- 7.3 Consequences for Switzerland.
7.3.1 Implementation Possibilities: Make or Buy -- 7.3.2 Variation and Recommendation -- 7.4 Conclusion -- References -- 8 Homomorphic Encryption -- 8.1 Introduction -- 8.2 Definition and Analysis -- 8.2.1 Trends -- 8.3 Consequences for Switzerland -- 8.3.1 Implementation Possibilities: Make or Buy -- 8.3.2 Variations and Recommendation -- 8.4 Conclusion -- References -- 9 Quantum Key Distribution -- 9.1 Introduction -- 9.2 Analysis -- 9.2.1 Definition -- 9.2.2 Trends -- 9.3 Consequences for Switzerland -- 9.3.1 Implementation Possibilities: Make or Buy -- 9.3.2 Variations and Recommendation -- 9.4 Conclusion -- References -- 10 Post-quantum Cryptography -- 10.1 Introduction -- 10.2 Analysis -- 10.2.1 Definition -- 10.2.2 Trends -- 10.3 Consequences for Switzerland -- 10.3.1 Implementation Possibilities: Make or Buy -- 10.3.2 Variations and Recommendation -- 10.4 Conclusion -- References -- Part II Low-Level Applications -- 11 Functional Encryption -- 11.1 Introduction -- 11.2 Analysis -- 11.2.1 Definition -- 11.2.2 Trends -- 11.3 Consequences for Switzerland -- 11.3.1 Implementation Possibilities: Make or Buy -- 11.3.2 Variations and Recommendation -- 11.4 Conclusion -- References -- 12 Identity-Based Cryptography -- 12.1 Introduction -- 12.2 Analysis -- 12.2.1 Definition -- 12.2.2 Trends -- 12.3 Consequences for Switzerland -- 12.3.1 Implementation Possibilities: Make or Buy -- 12.3.2 Variations and Recommendation -- 12.4 Conclusion -- References -- 13 Multi-Party Threshold Cryptography -- 13.1 Introduction -- 13.2 Analysis -- 13.2.1 Definition -- 13.2.2 Trends -- 13.3 Consequences for Switzerland -- 13.3.1 Implementation Possibilities: Make or Buy -- 13.3.2 Variations and Recommendation -- 13.4 Conclusion -- References -- 14 Searchable Symmetric Encryption -- 14.1 Introduction -- 14.2 Analysis -- 14.2.1 Definition -- 14.2.2 Trends.
14.3 Consequences for Switzerland -- 14.3.1 Implementation Possibilities: Make or Buy -- 14.3.2 Variations and Recommendation -- 14.4 Conclusion -- References -- 15 Digital Signature -- 15.1 Introduction -- 15.2 Analysis -- 15.2.1 Definition -- 15.2.2 Trends -- 15.3 Consequences for Switzerland -- 15.3.1 Implementation Possibilities: Make or Buy -- 15.3.1.1 Distinction from Electronic Signature -- 15.3.1.2 Code Signing -- 15.4 Conclusion -- References -- 16 Hardware Security Module -- 16.1 Introduction -- 16.2 Analysis -- 16.2.1 Definition -- 16.2.2 Trends -- 16.3 Consequences for Switzerland -- 16.3.1 Maturity -- 16.3.2 Recommendation and Options -- 16.4 Conclusion -- References -- 17 Secure Multi-Party Computation -- 17.1 Introduction -- 17.2 Analysis -- 17.2.1 Definition -- 17.2.2 Trends -- 17.3 Consequences for Switzerland -- 17.3.1 Implementation Possibilities: Make or Buy -- 17.3.2 Variations and Recommendation -- 17.4 Conclusion -- References -- Part III High-Level Applications -- 18 Trusted Execution Environment -- 18.1 Introduction -- 18.2 Analysis -- 18.2.1 Definition -- 18.2.2 Trends -- 18.2.2.1 Application on Mobile Phones -- 18.2.2.2 Security in Cloud Data Processing -- 18.2.2.3 Data Protection Laws -- 18.2.2.4 Cryptocurrency Usage -- 18.2.2.5 Demand -- 18.2.2.6 Actors -- 18.2.2.7 Research -- 18.3 Consequences for Switzerland -- 18.3.1 Maturity -- 18.3.1.1 Recommendations and Options -- 18.4 Conclusion -- References -- 19 Confidential Computing -- 19.1 Introduction -- 19.2 Analysis -- 19.2.1 Definition -- 19.2.2 Trends -- 19.3 Consequences for Switzerland -- 19.3.1 Implementation Possibilities: Make or Buy -- 19.4 Conclusion -- References -- 20 Hardware Acceleration -- 20.1 Introduction -- 20.2 Analysis -- 20.2.1 Definition -- 20.2.2 Trends -- 20.3 Consequences for Switzerland -- 20.3.1 Implementation Possibilities: Make or Buy.
20.3.2 Variations and Recommendation -- 20.4 Conclusion -- References -- 21 Secure Operating System -- 21.1 Introduction -- 21.2 Analysis -- 21.2.1 Definition -- 21.2.2 Trends -- 21.3 Consequences for Switzerland -- 21.3.1 Implementation Possibilities: Make or Buy -- 21.4 Conclusion -- References -- 22 Biometrics -- 22.1 Introduction -- 22.2 Analysis -- 22.2.1 Definition -- 22.2.2 Trends -- 22.3 Consequences for Switzerland -- 22.3.1 Implementation Possibilities: Make or Buy -- 22.3.2 Variation and Recommendation -- 22.4 Conclusion -- References -- 23 Electronic Voting -- 23.1 Introduction -- 23.2 Analysis -- 23.2.1 Definition -- 23.2.2 Trends -- 23.3 Consequences for Switzerland -- 23.3.1 Implementation Possibilities: Make or Buy -- 23.3.2 Variations and Recommendation -- 23.4 Conclusion -- References -- 24 Data in Transit Security -- 24.1 Introduction -- 24.2 Analysis -- 24.2.1 Definition -- 24.2.2 Trends -- 24.3 Consequences for Switzerland -- 24.3.1 Implementation Possibilities: Make or Buy -- 24.4 Conclusion -- References -- 25 Blockchain -- 25.1 Introduction -- 25.2 Analysis -- 25.2.1 Definition -- 25.2.2 Trends -- 25.3 Consequences for Switzerland -- 25.3.1 Implementation Possibilities: Make or Buy -- 25.3.2 Use Cases -- 25.4 Conclusion -- References -- 26 Tunneling and VPN -- 26.1 Introduction -- 26.2 Analysis -- 26.2.1 Definition -- 26.2.2 Trends -- 26.3 Consequences for Switzerland -- 26.3.1 Implementation Possibilities: Make or Buy -- 26.3.2 Variation and Recommendation -- 26.4 Conclusion -- References -- Part IV Data Protection -- 27 Differential Privacy -- 27.1 Introduction -- 27.2 Analysis -- 27.2.1 Definition -- 27.2.2 Trends -- 27.3 Consequences for Switzerland -- 27.3.1 Implementation Possibilities: Make or Buy -- 27.4 Conclusion -- References -- 28 Digital Rights Management -- 28.1 Introduction -- 28.2 Analysis -- 28.2.1 Definition.
28.2.2 Trends -- 28.3 Consequences for Switzerland -- 28.3.1 Implementation Possibilities: Make or Buy -- 28.3.2 Variation and Recommendation -- 28.4 Conclusion -- References -- 29 Authentication -- 29.1 Introduction -- 29.2 Analysis -- 29.2.1 Definition -- 29.2.2 Trends -- 29.3 Consequences for Switzerland -- 29.3.1 Implementation Possibilities: Make or Buy -- 29.4 Conclusion -- References -- Part V Use-Cases -- 30 Secure Media -- 30.1 Introduction -- 30.2 Analysis -- 30.2.1 Definition -- 30.2.2 Trends -- 30.3 Consequences for Switzerland -- 30.3.1 Implementation Possibilities: Make or Buy -- 30.3.2 Variations and Recommendation -- 30.4 Conclusion -- References -- 31 Secure Positioning and Localization -- 31.1 Introduction -- 31.2 Analysis -- 31.2.1 Definition -- 31.2.2 Trends -- 31.3 Consequences for Switzerland -- 31.3.1 Implementation Possibilities: Make or Buy -- 31.3.2 Variations and Recommendation -- 31.4 Conclusion -- References -- 32 Secure Payment -- 32.1 Introduction -- 32.2 Analysis -- 32.2.1 Definition -- 32.2.2 Trends -- 32.3 Consequences for Switzerland -- 32.3.1 Implementation Possibilities: Make or Buy -- 32.3.2 Variation and Recommendation -- 32.4 Conclusion -- References -- 33 Disk, File and Database Encryption -- 33.1 Introduction -- 33.2 Analysis -- 33.3 Definition -- 33.3.1 Full Disk Encryption (FDE) -- 33.3.2 File-Based Encryption (FBE) -- 33.3.3 Manual File Encryption -- 33.3.4 Database Encryption (DBE) -- 33.4 Security Considerations -- 33.4.1 Encryption Algorithms -- 33.4.2 Key Management -- 33.4.3 Coercion -- 33.5 OS Examples -- 33.6 Trends -- 33.7 Consequences for Switzerland -- 33.8 Conclusion -- References -- 34 WEB3 -- 34.1 Introduction -- 34.2 Analysis -- 34.2.1 Definition -- 34.2.2 Technologies -- 34.2.3 Risks -- 34.2.4 Trends -- 34.3 Consequences for Switzerland -- 34.3.1 Adoption and Efficacy -- 34.4 Conclusion.
References.
author_facet Mulder, Valentin.
Mermoud, Alain.
Lenders, Vincent.
Tellenbach, Bernhard.
author_variant v m vm
author2 Mermoud, Alain.
Lenders, Vincent.
Tellenbach, Bernhard.
author2_variant a m am
v l vl
b t bt
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Mulder, Valentin.
title Trends in Data Protection and Encryption Technologies.
title_full Trends in Data Protection and Encryption Technologies.
title_fullStr Trends in Data Protection and Encryption Technologies.
title_full_unstemmed Trends in Data Protection and Encryption Technologies.
title_auth Trends in Data Protection and Encryption Technologies.
title_new Trends in Data Protection and Encryption Technologies.
title_sort trends in data protection and encryption technologies.
publisher Springer,
publishDate 2023
physical 1 online resource (255 pages)
edition 1st ed.
contents Intro -- Foreword by Quentin Ladetto -- Foreword by Florian Schütz -- Preface -- Acknowledgements -- Contents -- List of Contributors -- Part I Encryption Foundations -- 1 One-Time Pad -- 1.1 Introduction -- 1.2 Analysis -- 1.2.1 Definition -- 1.2.2 Trends -- 1.3 Consequences for Switzerland -- 1.3.1 Implementation Possibilities -- 1.4 Conclusion -- References -- 2 Symmetric Cryptography -- 2.1 Introduction -- 2.2 Analysis -- 2.2.1 Definition -- 2.2.2 Trends -- 2.3 Consequences for Switzerland -- 2.3.1 Implementation Possibilities -- 2.4 Conclusion -- References -- 3 Asymmetric Encryption -- 3.1 Introduction -- 3.2 Analysis -- 3.2.1 Definition -- 3.2.2 Trends -- 3.3 Consequences for Switzerland -- 3.3.1 Implementation Possibilities: Make or Buy -- 3.3.2 Variation and Recommendation -- 3.4 Conclusion -- References -- 4 Key Management -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Definition -- 4.2.1.1 Key Creation -- 4.2.1.2 Key Storage -- 4.2.1.3 Key Distribution -- 4.2.1.4 Key Usage -- 4.2.2 Trends -- 4.3 Consequences for Switzerland -- 4.3.1 Implementation Possibilities: Make or Buy -- 4.3.2 Variations and Recommendation -- 4.4 Conclusion -- References -- 5 Hash Functions -- 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Definition -- 5.2.2 Trends -- 5.3 Consequences for Switzerland -- 5.3.1 Implementation Possibilities -- 5.4 Conclusion -- References -- 6 Zero-Knowledge Proof -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Definition -- 6.2.2 Trends -- 6.3 Consequences for Switzerland -- 6.3.1 Public Sector -- 6.3.2 Private Sector -- 6.3.3 Civil Society -- 6.3.4 Implementation Possibilities: Make or Buy -- 6.3.5 Variation and Recommendation -- 6.4 Conclusion -- References -- 7 Random Number Generator -- 7.1 Introduction -- 7.2 Analysis -- 7.2.1 Definition -- 7.2.2 Trends -- 7.3 Consequences for Switzerland.
7.3.1 Implementation Possibilities: Make or Buy -- 7.3.2 Variation and Recommendation -- 7.4 Conclusion -- References -- 8 Homomorphic Encryption -- 8.1 Introduction -- 8.2 Definition and Analysis -- 8.2.1 Trends -- 8.3 Consequences for Switzerland -- 8.3.1 Implementation Possibilities: Make or Buy -- 8.3.2 Variations and Recommendation -- 8.4 Conclusion -- References -- 9 Quantum Key Distribution -- 9.1 Introduction -- 9.2 Analysis -- 9.2.1 Definition -- 9.2.2 Trends -- 9.3 Consequences for Switzerland -- 9.3.1 Implementation Possibilities: Make or Buy -- 9.3.2 Variations and Recommendation -- 9.4 Conclusion -- References -- 10 Post-quantum Cryptography -- 10.1 Introduction -- 10.2 Analysis -- 10.2.1 Definition -- 10.2.2 Trends -- 10.3 Consequences for Switzerland -- 10.3.1 Implementation Possibilities: Make or Buy -- 10.3.2 Variations and Recommendation -- 10.4 Conclusion -- References -- Part II Low-Level Applications -- 11 Functional Encryption -- 11.1 Introduction -- 11.2 Analysis -- 11.2.1 Definition -- 11.2.2 Trends -- 11.3 Consequences for Switzerland -- 11.3.1 Implementation Possibilities: Make or Buy -- 11.3.2 Variations and Recommendation -- 11.4 Conclusion -- References -- 12 Identity-Based Cryptography -- 12.1 Introduction -- 12.2 Analysis -- 12.2.1 Definition -- 12.2.2 Trends -- 12.3 Consequences for Switzerland -- 12.3.1 Implementation Possibilities: Make or Buy -- 12.3.2 Variations and Recommendation -- 12.4 Conclusion -- References -- 13 Multi-Party Threshold Cryptography -- 13.1 Introduction -- 13.2 Analysis -- 13.2.1 Definition -- 13.2.2 Trends -- 13.3 Consequences for Switzerland -- 13.3.1 Implementation Possibilities: Make or Buy -- 13.3.2 Variations and Recommendation -- 13.4 Conclusion -- References -- 14 Searchable Symmetric Encryption -- 14.1 Introduction -- 14.2 Analysis -- 14.2.1 Definition -- 14.2.2 Trends.
14.3 Consequences for Switzerland -- 14.3.1 Implementation Possibilities: Make or Buy -- 14.3.2 Variations and Recommendation -- 14.4 Conclusion -- References -- 15 Digital Signature -- 15.1 Introduction -- 15.2 Analysis -- 15.2.1 Definition -- 15.2.2 Trends -- 15.3 Consequences for Switzerland -- 15.3.1 Implementation Possibilities: Make or Buy -- 15.3.1.1 Distinction from Electronic Signature -- 15.3.1.2 Code Signing -- 15.4 Conclusion -- References -- 16 Hardware Security Module -- 16.1 Introduction -- 16.2 Analysis -- 16.2.1 Definition -- 16.2.2 Trends -- 16.3 Consequences for Switzerland -- 16.3.1 Maturity -- 16.3.2 Recommendation and Options -- 16.4 Conclusion -- References -- 17 Secure Multi-Party Computation -- 17.1 Introduction -- 17.2 Analysis -- 17.2.1 Definition -- 17.2.2 Trends -- 17.3 Consequences for Switzerland -- 17.3.1 Implementation Possibilities: Make or Buy -- 17.3.2 Variations and Recommendation -- 17.4 Conclusion -- References -- Part III High-Level Applications -- 18 Trusted Execution Environment -- 18.1 Introduction -- 18.2 Analysis -- 18.2.1 Definition -- 18.2.2 Trends -- 18.2.2.1 Application on Mobile Phones -- 18.2.2.2 Security in Cloud Data Processing -- 18.2.2.3 Data Protection Laws -- 18.2.2.4 Cryptocurrency Usage -- 18.2.2.5 Demand -- 18.2.2.6 Actors -- 18.2.2.7 Research -- 18.3 Consequences for Switzerland -- 18.3.1 Maturity -- 18.3.1.1 Recommendations and Options -- 18.4 Conclusion -- References -- 19 Confidential Computing -- 19.1 Introduction -- 19.2 Analysis -- 19.2.1 Definition -- 19.2.2 Trends -- 19.3 Consequences for Switzerland -- 19.3.1 Implementation Possibilities: Make or Buy -- 19.4 Conclusion -- References -- 20 Hardware Acceleration -- 20.1 Introduction -- 20.2 Analysis -- 20.2.1 Definition -- 20.2.2 Trends -- 20.3 Consequences for Switzerland -- 20.3.1 Implementation Possibilities: Make or Buy.
20.3.2 Variations and Recommendation -- 20.4 Conclusion -- References -- 21 Secure Operating System -- 21.1 Introduction -- 21.2 Analysis -- 21.2.1 Definition -- 21.2.2 Trends -- 21.3 Consequences for Switzerland -- 21.3.1 Implementation Possibilities: Make or Buy -- 21.4 Conclusion -- References -- 22 Biometrics -- 22.1 Introduction -- 22.2 Analysis -- 22.2.1 Definition -- 22.2.2 Trends -- 22.3 Consequences for Switzerland -- 22.3.1 Implementation Possibilities: Make or Buy -- 22.3.2 Variation and Recommendation -- 22.4 Conclusion -- References -- 23 Electronic Voting -- 23.1 Introduction -- 23.2 Analysis -- 23.2.1 Definition -- 23.2.2 Trends -- 23.3 Consequences for Switzerland -- 23.3.1 Implementation Possibilities: Make or Buy -- 23.3.2 Variations and Recommendation -- 23.4 Conclusion -- References -- 24 Data in Transit Security -- 24.1 Introduction -- 24.2 Analysis -- 24.2.1 Definition -- 24.2.2 Trends -- 24.3 Consequences for Switzerland -- 24.3.1 Implementation Possibilities: Make or Buy -- 24.4 Conclusion -- References -- 25 Blockchain -- 25.1 Introduction -- 25.2 Analysis -- 25.2.1 Definition -- 25.2.2 Trends -- 25.3 Consequences for Switzerland -- 25.3.1 Implementation Possibilities: Make or Buy -- 25.3.2 Use Cases -- 25.4 Conclusion -- References -- 26 Tunneling and VPN -- 26.1 Introduction -- 26.2 Analysis -- 26.2.1 Definition -- 26.2.2 Trends -- 26.3 Consequences for Switzerland -- 26.3.1 Implementation Possibilities: Make or Buy -- 26.3.2 Variation and Recommendation -- 26.4 Conclusion -- References -- Part IV Data Protection -- 27 Differential Privacy -- 27.1 Introduction -- 27.2 Analysis -- 27.2.1 Definition -- 27.2.2 Trends -- 27.3 Consequences for Switzerland -- 27.3.1 Implementation Possibilities: Make or Buy -- 27.4 Conclusion -- References -- 28 Digital Rights Management -- 28.1 Introduction -- 28.2 Analysis -- 28.2.1 Definition.
28.2.2 Trends -- 28.3 Consequences for Switzerland -- 28.3.1 Implementation Possibilities: Make or Buy -- 28.3.2 Variation and Recommendation -- 28.4 Conclusion -- References -- 29 Authentication -- 29.1 Introduction -- 29.2 Analysis -- 29.2.1 Definition -- 29.2.2 Trends -- 29.3 Consequences for Switzerland -- 29.3.1 Implementation Possibilities: Make or Buy -- 29.4 Conclusion -- References -- Part V Use-Cases -- 30 Secure Media -- 30.1 Introduction -- 30.2 Analysis -- 30.2.1 Definition -- 30.2.2 Trends -- 30.3 Consequences for Switzerland -- 30.3.1 Implementation Possibilities: Make or Buy -- 30.3.2 Variations and Recommendation -- 30.4 Conclusion -- References -- 31 Secure Positioning and Localization -- 31.1 Introduction -- 31.2 Analysis -- 31.2.1 Definition -- 31.2.2 Trends -- 31.3 Consequences for Switzerland -- 31.3.1 Implementation Possibilities: Make or Buy -- 31.3.2 Variations and Recommendation -- 31.4 Conclusion -- References -- 32 Secure Payment -- 32.1 Introduction -- 32.2 Analysis -- 32.2.1 Definition -- 32.2.2 Trends -- 32.3 Consequences for Switzerland -- 32.3.1 Implementation Possibilities: Make or Buy -- 32.3.2 Variation and Recommendation -- 32.4 Conclusion -- References -- 33 Disk, File and Database Encryption -- 33.1 Introduction -- 33.2 Analysis -- 33.3 Definition -- 33.3.1 Full Disk Encryption (FDE) -- 33.3.2 File-Based Encryption (FBE) -- 33.3.3 Manual File Encryption -- 33.3.4 Database Encryption (DBE) -- 33.4 Security Considerations -- 33.4.1 Encryption Algorithms -- 33.4.2 Key Management -- 33.4.3 Coercion -- 33.5 OS Examples -- 33.6 Trends -- 33.7 Consequences for Switzerland -- 33.8 Conclusion -- References -- 34 WEB3 -- 34.1 Introduction -- 34.2 Analysis -- 34.2.1 Definition -- 34.2.2 Technologies -- 34.2.3 Risks -- 34.2.4 Trends -- 34.3 Consequences for Switzerland -- 34.3.1 Adoption and Efficacy -- 34.4 Conclusion.
References.
isbn 9783031333866
9783031333859
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30670648
illustrated Not Illustrated
oclc_num 1393224341
work_keys_str_mv AT muldervalentin trendsindataprotectionandencryptiontechnologies
AT mermoudalain trendsindataprotectionandencryptiontechnologies
AT lendersvincent trendsindataprotectionandencryptiontechnologies
AT tellenbachbernhard trendsindataprotectionandencryptiontechnologies
status_str n
ids_txt_mv (MiAaPQ)50030670648
(Au-PeEL)EBL30670648
(OCoLC)1393224341
carrierType_str_mv cr
is_hierarchy_title Trends in Data Protection and Encryption Technologies.
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
marc_error Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ]
_version_ 1792331071526797312
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>10976nam a22004693i 4500</leader><controlfield tag="001">50030670648</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073851.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2023 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031333866</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783031333859</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)50030670648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30670648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1393224341</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mulder, Valentin.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trends in Data Protection and Encryption Technologies.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (255 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Foreword by Quentin Ladetto -- Foreword by Florian Schütz -- Preface -- Acknowledgements -- Contents -- List of Contributors -- Part I Encryption Foundations -- 1 One-Time Pad -- 1.1 Introduction -- 1.2 Analysis -- 1.2.1 Definition -- 1.2.2 Trends -- 1.3 Consequences for Switzerland -- 1.3.1 Implementation Possibilities -- 1.4 Conclusion -- References -- 2 Symmetric Cryptography -- 2.1 Introduction -- 2.2 Analysis -- 2.2.1 Definition -- 2.2.2 Trends -- 2.3 Consequences for Switzerland -- 2.3.1 Implementation Possibilities -- 2.4 Conclusion -- References -- 3 Asymmetric Encryption -- 3.1 Introduction -- 3.2 Analysis -- 3.2.1 Definition -- 3.2.2 Trends -- 3.3 Consequences for Switzerland -- 3.3.1 Implementation Possibilities: Make or Buy -- 3.3.2 Variation and Recommendation -- 3.4 Conclusion -- References -- 4 Key Management -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Definition -- 4.2.1.1 Key Creation -- 4.2.1.2 Key Storage -- 4.2.1.3 Key Distribution -- 4.2.1.4 Key Usage -- 4.2.2 Trends -- 4.3 Consequences for Switzerland -- 4.3.1 Implementation Possibilities: Make or Buy -- 4.3.2 Variations and Recommendation -- 4.4 Conclusion -- References -- 5 Hash Functions -- 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Definition -- 5.2.2 Trends -- 5.3 Consequences for Switzerland -- 5.3.1 Implementation Possibilities -- 5.4 Conclusion -- References -- 6 Zero-Knowledge Proof -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Definition -- 6.2.2 Trends -- 6.3 Consequences for Switzerland -- 6.3.1 Public Sector -- 6.3.2 Private Sector -- 6.3.3 Civil Society -- 6.3.4 Implementation Possibilities: Make or Buy -- 6.3.5 Variation and Recommendation -- 6.4 Conclusion -- References -- 7 Random Number Generator -- 7.1 Introduction -- 7.2 Analysis -- 7.2.1 Definition -- 7.2.2 Trends -- 7.3 Consequences for Switzerland.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.3.1 Implementation Possibilities: Make or Buy -- 7.3.2 Variation and Recommendation -- 7.4 Conclusion -- References -- 8 Homomorphic Encryption -- 8.1 Introduction -- 8.2 Definition and Analysis -- 8.2.1 Trends -- 8.3 Consequences for Switzerland -- 8.3.1 Implementation Possibilities: Make or Buy -- 8.3.2 Variations and Recommendation -- 8.4 Conclusion -- References -- 9 Quantum Key Distribution -- 9.1 Introduction -- 9.2 Analysis -- 9.2.1 Definition -- 9.2.2 Trends -- 9.3 Consequences for Switzerland -- 9.3.1 Implementation Possibilities: Make or Buy -- 9.3.2 Variations and Recommendation -- 9.4 Conclusion -- References -- 10 Post-quantum Cryptography -- 10.1 Introduction -- 10.2 Analysis -- 10.2.1 Definition -- 10.2.2 Trends -- 10.3 Consequences for Switzerland -- 10.3.1 Implementation Possibilities: Make or Buy -- 10.3.2 Variations and Recommendation -- 10.4 Conclusion -- References -- Part II Low-Level Applications -- 11 Functional Encryption -- 11.1 Introduction -- 11.2 Analysis -- 11.2.1 Definition -- 11.2.2 Trends -- 11.3 Consequences for Switzerland -- 11.3.1 Implementation Possibilities: Make or Buy -- 11.3.2 Variations and Recommendation -- 11.4 Conclusion -- References -- 12 Identity-Based Cryptography -- 12.1 Introduction -- 12.2 Analysis -- 12.2.1 Definition -- 12.2.2 Trends -- 12.3 Consequences for Switzerland -- 12.3.1 Implementation Possibilities: Make or Buy -- 12.3.2 Variations and Recommendation -- 12.4 Conclusion -- References -- 13 Multi-Party Threshold Cryptography -- 13.1 Introduction -- 13.2 Analysis -- 13.2.1 Definition -- 13.2.2 Trends -- 13.3 Consequences for Switzerland -- 13.3.1 Implementation Possibilities: Make or Buy -- 13.3.2 Variations and Recommendation -- 13.4 Conclusion -- References -- 14 Searchable Symmetric Encryption -- 14.1 Introduction -- 14.2 Analysis -- 14.2.1 Definition -- 14.2.2 Trends.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">14.3 Consequences for Switzerland -- 14.3.1 Implementation Possibilities: Make or Buy -- 14.3.2 Variations and Recommendation -- 14.4 Conclusion -- References -- 15 Digital Signature -- 15.1 Introduction -- 15.2 Analysis -- 15.2.1 Definition -- 15.2.2 Trends -- 15.3 Consequences for Switzerland -- 15.3.1 Implementation Possibilities: Make or Buy -- 15.3.1.1 Distinction from Electronic Signature -- 15.3.1.2 Code Signing -- 15.4 Conclusion -- References -- 16 Hardware Security Module -- 16.1 Introduction -- 16.2 Analysis -- 16.2.1 Definition -- 16.2.2 Trends -- 16.3 Consequences for Switzerland -- 16.3.1 Maturity -- 16.3.2 Recommendation and Options -- 16.4 Conclusion -- References -- 17 Secure Multi-Party Computation -- 17.1 Introduction -- 17.2 Analysis -- 17.2.1 Definition -- 17.2.2 Trends -- 17.3 Consequences for Switzerland -- 17.3.1 Implementation Possibilities: Make or Buy -- 17.3.2 Variations and Recommendation -- 17.4 Conclusion -- References -- Part III High-Level Applications -- 18 Trusted Execution Environment -- 18.1 Introduction -- 18.2 Analysis -- 18.2.1 Definition -- 18.2.2 Trends -- 18.2.2.1 Application on Mobile Phones -- 18.2.2.2 Security in Cloud Data Processing -- 18.2.2.3 Data Protection Laws -- 18.2.2.4 Cryptocurrency Usage -- 18.2.2.5 Demand -- 18.2.2.6 Actors -- 18.2.2.7 Research -- 18.3 Consequences for Switzerland -- 18.3.1 Maturity -- 18.3.1.1 Recommendations and Options -- 18.4 Conclusion -- References -- 19 Confidential Computing -- 19.1 Introduction -- 19.2 Analysis -- 19.2.1 Definition -- 19.2.2 Trends -- 19.3 Consequences for Switzerland -- 19.3.1 Implementation Possibilities: Make or Buy -- 19.4 Conclusion -- References -- 20 Hardware Acceleration -- 20.1 Introduction -- 20.2 Analysis -- 20.2.1 Definition -- 20.2.2 Trends -- 20.3 Consequences for Switzerland -- 20.3.1 Implementation Possibilities: Make or Buy.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">20.3.2 Variations and Recommendation -- 20.4 Conclusion -- References -- 21 Secure Operating System -- 21.1 Introduction -- 21.2 Analysis -- 21.2.1 Definition -- 21.2.2 Trends -- 21.3 Consequences for Switzerland -- 21.3.1 Implementation Possibilities: Make or Buy -- 21.4 Conclusion -- References -- 22 Biometrics -- 22.1 Introduction -- 22.2 Analysis -- 22.2.1 Definition -- 22.2.2 Trends -- 22.3 Consequences for Switzerland -- 22.3.1 Implementation Possibilities: Make or Buy -- 22.3.2 Variation and Recommendation -- 22.4 Conclusion -- References -- 23 Electronic Voting -- 23.1 Introduction -- 23.2 Analysis -- 23.2.1 Definition -- 23.2.2 Trends -- 23.3 Consequences for Switzerland -- 23.3.1 Implementation Possibilities: Make or Buy -- 23.3.2 Variations and Recommendation -- 23.4 Conclusion -- References -- 24 Data in Transit Security -- 24.1 Introduction -- 24.2 Analysis -- 24.2.1 Definition -- 24.2.2 Trends -- 24.3 Consequences for Switzerland -- 24.3.1 Implementation Possibilities: Make or Buy -- 24.4 Conclusion -- References -- 25 Blockchain -- 25.1 Introduction -- 25.2 Analysis -- 25.2.1 Definition -- 25.2.2 Trends -- 25.3 Consequences for Switzerland -- 25.3.1 Implementation Possibilities: Make or Buy -- 25.3.2 Use Cases -- 25.4 Conclusion -- References -- 26 Tunneling and VPN -- 26.1 Introduction -- 26.2 Analysis -- 26.2.1 Definition -- 26.2.2 Trends -- 26.3 Consequences for Switzerland -- 26.3.1 Implementation Possibilities: Make or Buy -- 26.3.2 Variation and Recommendation -- 26.4 Conclusion -- References -- Part IV Data Protection -- 27 Differential Privacy -- 27.1 Introduction -- 27.2 Analysis -- 27.2.1 Definition -- 27.2.2 Trends -- 27.3 Consequences for Switzerland -- 27.3.1 Implementation Possibilities: Make or Buy -- 27.4 Conclusion -- References -- 28 Digital Rights Management -- 28.1 Introduction -- 28.2 Analysis -- 28.2.1 Definition.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">28.2.2 Trends -- 28.3 Consequences for Switzerland -- 28.3.1 Implementation Possibilities: Make or Buy -- 28.3.2 Variation and Recommendation -- 28.4 Conclusion -- References -- 29 Authentication -- 29.1 Introduction -- 29.2 Analysis -- 29.2.1 Definition -- 29.2.2 Trends -- 29.3 Consequences for Switzerland -- 29.3.1 Implementation Possibilities: Make or Buy -- 29.4 Conclusion -- References -- Part V Use-Cases -- 30 Secure Media -- 30.1 Introduction -- 30.2 Analysis -- 30.2.1 Definition -- 30.2.2 Trends -- 30.3 Consequences for Switzerland -- 30.3.1 Implementation Possibilities: Make or Buy -- 30.3.2 Variations and Recommendation -- 30.4 Conclusion -- References -- 31 Secure Positioning and Localization -- 31.1 Introduction -- 31.2 Analysis -- 31.2.1 Definition -- 31.2.2 Trends -- 31.3 Consequences for Switzerland -- 31.3.1 Implementation Possibilities: Make or Buy -- 31.3.2 Variations and Recommendation -- 31.4 Conclusion -- References -- 32 Secure Payment -- 32.1 Introduction -- 32.2 Analysis -- 32.2.1 Definition -- 32.2.2 Trends -- 32.3 Consequences for Switzerland -- 32.3.1 Implementation Possibilities: Make or Buy -- 32.3.2 Variation and Recommendation -- 32.4 Conclusion -- References -- 33 Disk, File and Database Encryption -- 33.1 Introduction -- 33.2 Analysis -- 33.3 Definition -- 33.3.1 Full Disk Encryption (FDE) -- 33.3.2 File-Based Encryption (FBE) -- 33.3.3 Manual File Encryption -- 33.3.4 Database Encryption (DBE) -- 33.4 Security Considerations -- 33.4.1 Encryption Algorithms -- 33.4.2 Key Management -- 33.4.3 Coercion -- 33.5 OS Examples -- 33.6 Trends -- 33.7 Consequences for Switzerland -- 33.8 Conclusion -- References -- 34 WEB3 -- 34.1 Introduction -- 34.2 Analysis -- 34.2.1 Definition -- 34.2.2 Technologies -- 34.2.3 Risks -- 34.2.4 Trends -- 34.3 Consequences for Switzerland -- 34.3.1 Adoption and Efficacy -- 34.4 Conclusion.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">References.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mermoud, Alain.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lenders, Vincent.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tellenbach, Bernhard.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Mulder, Valentin</subfield><subfield code="t">Trends in Data Protection and Encryption Technologies</subfield><subfield code="d">Cham : Springer,c2023</subfield><subfield code="z">9783031333859</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30670648</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>