Advances in Information and Computer Security
Springer Berlin (Verlag)
978-3-540-47699-3 (ISBN)
Dr. Kai Rannenberg (Universität Freiburg, Institut für Informatik und Gesellschaft, Abteilung Telematik, www.iig.uni-freiburg.de/ kara) hat Informatik, Wirtschafts- und Rechtswissenschaften studiert. Er koordiniert das Kolleg "Sicherheit in der Kommunikationstechnik" der gemeinnützigen Gottlieb Daimler- und Karl Benz-Stiftung. Seit 1990 arbeitet er auf dem Gebiet IT-Sicherheitszertifizierung, u. a. bei DIN und ISO an der Normung von IT-Sicherheitsevaluationskriterien.
Signatures (1).- ID-Based Ring Signature Scheme Secure in the Standard Model.- A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability.- Sound Computational Interpretation of Symbolic Hashes in the Standard Model.- Security Evaluation.- A Requirement Centric Framework for Information Security Evaluation.- A Model-Based Method for Security Configuration Verification.- Personal Computer Privacy: Analysis for Korean PC Users.- Signatures (2).- Short Traceable Signatures Based on Bilinear Pairings.- Ring Signature with Designated Linkability.- Ad Hoc Group Signatures.- Rateless Codes for the Multicast Stream Authentication Problem.- Authentication.- Crossing Borders: Security and Privacy Issues of the European e-Passport.- A New Approach to Hide Policy for Automated Trust Negotiation.- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.- IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.- Security for Multimedia.- A Study of Detection Method of Printed Image Alteration Using Digital Watermark.- Real-Time Watermark Embedding for High Resolution Video Watermarking.- Inhibiting Card Sharing Attacks.- Network Security.- A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction.- Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.- Modeling of Network Intrusions Based on the Multiple Transition Probability.- Encryption and Key Exchange.- Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition.- Ciphertext-Auditable Public Key Encryption.- Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.- Cryptanalysis and Implementation.- On the Effectiveness of TMTO and Exhaustive Search Attacks.- Low Power AES Hardware Architecture for Radio Frequency Identification.- The High-Speed Packet Cipher System Suitable for Small Sized Data.- Access Control.- A Tool for Managing Security Policies in Organisations.- Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.- The Complexity of Discretionary Access Control.- Traceroute Based IP Channel for Sending Hidden Short Messages.
Erscheint lt. Verlag | 11.10.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 438 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 687 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Access Control • Algorithm analysis and problem complexity • algorithms • authentication • Cryptanalysis • cryptographic protocols • Data Security • denial of service • Digital Signatures • DoS attacks • Identity • Information • Information Security • Intrusion Detection • Linux • Network Security • public key encryption • security • Security Engineering • Security evaluation • Security Technology • Symbol • systens security • Trust • verification • Watermarking |
ISBN-10 | 3-540-47699-7 / 3540476997 |
ISBN-13 | 978-3-540-47699-3 / 9783540476993 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich