Anonymity and Privacy Applied Cryptography and Implementations Authentication, Identification and Access Control Block and Stream Ciphers Cloud Computing Security Complexity-Theoretic Cryptography Crypto Analysis