Advances in Information and Computer Security
Springer Berlin (Verlag)
978-3-642-16824-6 (ISBN)
Invited Talks.- Automating Security Configuration and Administration: An Access Control Perspective.- Security Metrics and Security Investment Models.- Encryption.- Publishing Upper Half of RSA Decryption Exponent.- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples.- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.- An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme.- Data and Web Security.- Practical Universal Random Sampling.- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints.- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.- Validating Security Policy Conformance with WS-Security Requirements.- Protocols.- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption.- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.- Network Security.- A Generic Binary Analysis Method for Malware.- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs.- Securing MANET Multicast Using DIPLOMA.- Block Cipher.- Preimage Attacks against Variants of Very Smooth Hash.- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification.- Mutual Information Analysis under the View of Higher-Order Statistics.- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter.- Implementation and Real Life Security.- Differential Addition in Generalized Edwards Coordinates.- Efficient Implementation of Pairing on BREW Mobile Phones.- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases.- Optimal Adversary Behaviorfor the Serial Model of Financial Attack Trees.
Erscheint lt. Verlag | 29.10.2010 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 371 p. 83 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Software Entwicklung ► User Interfaces (HCI) | |
Schlagworte | anonymity • asymmetric encryption • authentication • Computer Security • Cryptanalysis • Cryptology • data outsourcing • Digital Signatures • efficient decryption • Elliptic Curve Cryptography • group signature • higher-order statistics • identity-based encryption • Information Security • Interactive proof • Intrusion Detection • MANETs • Network Security • oblivious transfer • provable security • Public Key Cryptography • public key encryption • rijndael • rsa • security testing • Software Security • Software Testing • super-sbox analysis • Systems Security • Testing • trapdoor test • verification • Zero Knowledge |
ISBN-10 | 3-642-16824-8 / 3642168248 |
ISBN-13 | 978-3-642-16824-6 / 9783642168246 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich