Information Security Applications
Springer Berlin (Verlag)
978-3-540-31012-9 (ISBN)
Security Analysis and Attacks.- Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes.- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis.- System Security.- An Alert Data Mining Framework for Network-Based Intrusion Detection System.- Key Factors Influencing Worm Infection in Enterprise Networks.- Evaluation of the Unified Modeling Language for Security Requirements Analysis.- Network Security.- A Simple and Efficient Conference Scheme for Mobile Communications.- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model.- Elastic Security QoS Provisioning for Telematics Applications.- DRM/Software Security.- An Improved Algorithm to Watermark Numeric Relational Data.- Video Fingerprinting System Using Wavelet and Error Correcting Code.- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels.- Kimchi: A Binary Rewriting Defense Against Format String Attacks.- Software Protection Through Dynamic Code Mutation.- Efficient HW Implementation.- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ).- Developing and Implementing IHPM on IXP 425 Network Processor Platforms.- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.- mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors.- Side-Channel Attacks.- Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA.- A DPA Countermeasure by Randomized Frobenius Decomposition.- DPA Attack on the Improved Ha-Moon Algorithm.- An Efficient Masking Scheme for AES SoftwareImplementations.- Privacy/Anonymity.- Secure Multi-attribute Procurement Auction.- Oblivious Conjunctive Keyword Search.- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption.- Efficient Implementation.- New Concept of Authority Range for Flexible Management of Role Hierarchy.- Role-Based Access Control Model for Ubiquitous Computing Environment.- Designing Security Auditing Protocol with Web Browsers.
Erscheint lt. Verlag | 10.2.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 378 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 553 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • anonymity • authentication • Cryptanalysis • Cryptographic Hardware • cryptographic protocols • Data Security • Digital Signatures • Information Security • Intrusion Detection • Network Security • privacy • RDM • security analysis • Security Technology • side-channel attacks • Software Security • Systems Security • Watermarking |
ISBN-10 | 3-540-31012-6 / 3540310126 |
ISBN-13 | 978-3-540-31012-9 / 9783540310129 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich