Skip to main content
Home

Main navigation

  • Home
  • Books
  • Contact
    • Contact Form

Breadcrumb

  1. Home

Translucent Databases 2nd Edition

By admin, 15 January, 2010

This new version of the bestselling classic includes four new chapters and updated versions of the originals. The book is still designed to help the world build databases that answer useful questions without keeping any useful information around. The examples show how most databases don't need to be filled with the world's secrets and personal information. If the client uses the right amount of encryption, the databases don't need to be dangerous one-stop shopping for the identity thieves and others who with malice aforethought.



The new chapters are:

  • Fuzzy Hashing -- Many of the techniques in the book rely heavily on one-way functions like SHA256, a very precise mathematical function that is very sensitive to a change in as little as one bit in the input. These fuzzy techniques are more forgiving and, alas, less secure.
  • XML -- There are a number of nice techniques developed by the XML community to put XML data into a canonical form. These are useful when data needs to pushed through a cryptographically secure hash function because even the smallest change can confuse the function. These canonical tools eliminate many of the small, inconsequential incongruities that are normally tolerated by the XML standard.
  • Voting -- Casting and counting votes is an extremely difficult problem. This chapter reviews several ways that we can build election systems that are both auditable and private.
  • Zero Knowledge Proofs -- This chapter shows an fascinating example of how the zero knowledge proof systems developed in the 1980s can be used to track traffic scofflaws without endangering the privacy of law abiding citizens.

The rest of the book is more up-to-date with copious warnings against using MD5 and other hash functions that haven't been as strong as we once assumed.



The book is back from the printers. It's available here:

  • Amazon

And also directly from me if you click below.

Catalog
Main

Books

  • Agents Unleashed
  • Attention Must Be Paid, But for $800?
  • Compression Algorithms
  • Digital Cash 2nd Edition
  • Digital Copyright Protection
  • Disappearing Cryptography 1st Edition
  • Disappearing Cryptography 2nd Edition
  • Disappearing Cryptography 3rd Edition
  • Free for All
  • Future Ride
  • How To Hide Online
  • Java Beans Programming
  • Java RAMBO Manifesto
  • Policing Online Games
  • SAT Sneak Attack
  • Translucent Databases
    • Case Studies in Translucent Databases
    • Case Study: Protecting Shoppers' Privacy
    • Downloads for Translucent Databases
    • Errata for Translucent Databases
    • FAQ for Translucent Databases
    • Ordering Translucent Databases 2nd Edition
    • Ordering the Lite Version
    • Table of Contents for Translucent Databases 2nd Edition
    • Table of Contents for Translucent Databases Lite
    • Table of Contents for Translucent Databases
RSS feed
Powered by Drupal