Information Security Applications
Springer Berlin (Verlag)
978-3-540-71092-9 (ISBN)
Public Key Crypto Applications/Virus Protection.- Controllable Ring Signatures.- Efficient User Authentication and Key Agreement in Wireless Sensor Networks.- Identity-Based Key Issuing Without Secure Channel in a Broad Area.- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.- Cyber Indication/Intrusion Detection.- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks.- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm.- Biometrics/Security Trust Management.- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification.- Quality Assurance for Evidence Collection in Network Forensics.- Secure Software/Systems.- Visualization of Permission Checks in Java Using Static Analysis.- Deployment of Virtual Machines in Lock-Keeper.- Smart Cards/Secure Hardware.- Investigations of Power Analysis Attacks and Countermeasures for ARIA.- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.- A Novel Key Agreement Scheme in a Multiple Server Environment.- Mobile Security.- Cost-Effective IDS Operating Scheme in MANETs.- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6.- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones.- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security.- Distributed Management of OMA DRM Domains.- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting.- A Key Management Based on Multiple Regression in Hierarchical Sensor Network.- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.- Privacy/Anonymity.- Privacy Protection in PKIs: A Separation-of-Authority Approach.- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise.- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature.- Secret Handshake with Multiple Groups.- Internet and Wireless Security.- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.- EAP Using the Split Password-Based Authenticated Key Agreement.- How Many Malicious Scanners Are in the Internet?.- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Erscheint lt. Verlag | 30.3.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 410 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 646 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • aes • algorithm • Algorithm analysis and problem complexity • anonymity • authentication • biometrics • Block Ciphers • Cryptanalysis • Cryptographic Hardware • cryptographic protocols • Data Security • Digital Signatures • DRM • fingerprint verfication • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Security • Intrusion Detection • IPv6 • privacy • Public Key • public key systems • RDM • RFID • RFID (Radio Frequency Identificatio) • security analysis • sensor networks • Smart card • Smart cards • Software Security • SQL • ubiquitous computing • virus protection • Watermarking • web application security |
ISBN-10 | 3-540-71092-2 / 3540710922 |
ISBN-13 | 978-3-540-71092-9 / 9783540710929 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich