Information and Communications Security
Springer Berlin (Verlag)
978-3-642-11144-0 (ISBN)
Invited Talks.- How to Steal a Botnet and What Can Happen When You Do.- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing.- Cryptanalysis.- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform.- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher.- Algorithms and Implementations.- The rakaposhi Stream Cipher.- Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes.- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.- Public Key Cryptography.- Online/Offline Ring Signature Scheme.- Policy-Controlled Signatures.- Public Key Encryption without Random Oracle Made Truly Practical.- A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate.- Security Applications.- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.- Biometric-Based Non-transferable Anonymous Credentials.- Software Security.- Secure Remote Execution of Sequential Computations.- Architecture- and OS-Independent Binary-Level Dynamic Test Generation.- System Security.- Measuring Information Flow in Reactive Processes.- Trusted Isolation Environment: An Attestation Architecture with Usage Control Model.- Denial-of-Service Attacks on Host-Based Generic Unpackers.- Network Security.- Predictive Pattern Matching for Scalable Network Intrusion Detection.- Deterministic Finite Automata Characterization for Memory-Based Pattern Matching.- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold.- User-Assisted Host-Based Detection of Outbound Malware Traffic.- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence.- Short Papers I.- Using the (Open) Solaris Service Management Facility as a Building Block for System Security.- IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper].- Database Security.- Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining.- GUC-Secure Join Operator in Distributed Relational Database.- Trust Management.- TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics.- Bring Efficient Connotation Expressible Policies to Trust Management.- A User Trust-Based Collaborative Filtering Recommendation Algorithm.- Applied Cryptography.- Fingerprinting Attack on the Tor Anonymity System.- Proactive Verifiable Linear Integer Secret Sharing Scheme.- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach.- Digital Audio Watermarking Technique Using Pseudo-Zernike Moments.- Short Papers II.- An Image Sanitizing Scheme Using Digital Watermarking.- Adaptive and Composable Oblivious Transfer Protocols (Short Paper).- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Erscheint lt. Verlag | 30.11.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 504 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 769 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • algorithms • Anomaly Detection • anonymity system • association rules mining • authentication • biometric data • block cipher • Camellia • Collaborative Filtering • Communication • Cryptanalysis • cryptographic protocols • cryptography • Data Security • Digital Signatures • digital watermarking • DoS attacks • Encryption • fingerprinting code • Firewall • Fourier transform • group key distribution • Hardcover, Softcover / Informatik, EDV/Informatik • identity-based encryption • Information • Information Security • Intrusion Detection • Malware • Network Security • onion routing • pairings • Phishing • privacy • Public Key • Recommender System • Reinforcement Learning • secure multiparty • Security Technology • self-healing • side-channel attacks • Systems Security • Tor • trust management • wireless sensor networks |
ISBN-10 | 3-642-11144-0 / 3642111440 |
ISBN-13 | 978-3-642-11144-0 / 9783642111440 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich