Information Security
Springer Berlin (Verlag)
978-3-540-29001-8 (ISBN)
Network Security I.- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks.- SVision: A Network Host-Centered Anomaly Visualization Technique.- Trust & Privacy.- Time-Based Release of Confidential Information in Hierarchical Settings.- "Trust Engineering:" From Requirements to System Design and Maintenance - A Working National Lottery System Experience.- A Privacy Preserving Rental System.- Key Management & Protocols.- Constant Round Dynamic Group Key Agreement.- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design.- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms.- On the Notion of Statistical Security in Simulatability Definitions.- Public Key Encryption & Signature.- Certificateless Public Key Encryption Without Pairing.- Tracing-by-Linking Group Signatures.- Chaum's Designated Confirmer Signature Revisited.- Network Security II.- gore: Routing-Assisted Defense Against DDoS Attacks.- IPSec Support in NAT-PT Scenario for IPv6 Transition.- Signcryption.- Hybrid Signcryption Schemes with Outsider Security.- Analysis and Improvement of a Signcryption Scheme with Key Privacy.- Efficient and Proactive Threshold Signcryption.- Crypto Algorithm & Analysis.- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?.- Hardware Architecture and Cost Estimates for Breaking SHA-1.- On the Security of Tweakable Modes of Operation: TBC and TAE.- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm.- Cryptography.- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.- An Oblivious Transfer Protocol with Log-Squared Communication.- Applications.- Electronic Voting: Starting Over?.- Timed-Release Encryption with Pre-open Capabilityand Its Application to Certified E-mail System.- Universally Composable Time-Stamping Schemes with Audit.- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.- Software Security.- Building a Cryptovirus Using Microsoft's Cryptographic API.- On the Security of the WinRAR Encryption Method.- Towards Better Software Tamper Resistance.- Authorization & Access Control.- Device-Enabled Authorization in the Grey System.- Evaluating Access Control Policies Through Model Checking.- A Cryptographic Solution for General Access Control.- Student Papers.- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.- A Formal Definition for Trust in Distributed Systems.- A Practical Voting Scheme with Receipts.- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation.- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Erscheint lt. Verlag | 12.9.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 520 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1630 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | algorithm • Algorithm analysis and problem complexity • algorithms • authentication • cryptographic protocols • cryptography • Data Integrity • Data Security • Digital Payment • Digital rights management • digital signature schemes • E-Commerce • Information • Information Hiding • Information Security • Network Security • Person Authentication • privacy • Public Key • Secure Communications • security • Systems Security • Trust • Watermarking |
ISBN-10 | 3-540-29001-X / 354029001X |
ISBN-13 | 978-3-540-29001-8 / 9783540290018 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich