Information and Communications Security
Springer Berlin (Verlag)
978-3-540-77047-3 (ISBN)
Authentication and Key Exchange.- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures.- New Construction of Group Secret Handshakes Based on Pairings.- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.- An Efficient Password-Only Two-Server Authenticated Key Exchange System.- Digital Signatures.- Formal Definition and Construction of Nominative Signature.- Short Group Signature Without Random Oracles.- (Convertible) Undeniable Signatures Without Random Oracles.- Applications.- A New Dynamic Accumulator for Batch Updates.- Preventing Unofficial Information Propagation.- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction.- Privacy Protection on Multiple Sensitive Attributes.- Watermarking.- Audio Watermarking Algorithm Based on Centroid and Statistical Features.- A Semi-blind Watermarking Based on Discrete Wavelet Transform.- Fast Implementations.- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.- High Speed Modular Divider Based on GCD Algorithm.- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.- Compact and Secure Design of Masked AES S-Box.- Applied Cryptography.- Boudot's Range-Bounded Commitment Scheme Revisited.- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.- Secure Multiparty Computation of DNF.- Cryptanalysis.- Square Like Attack on Camellia.- Differential Fault Analysis on CLEFIA.- Extending FORK-256 Attack to the Full Hash Function.- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.- Formal Analysis.- A Framework for Game-Based Security Proofs.- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.- Modeling Agreement Problems in the Universal Composability Framework.- System Security I.- A System Architecture for History-Based Access Control for XML Documents.- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.- System Security II.- A Novel Approach for Untrusted Code Execution.- Detection and Diagnosis of Control Interception.- BIOS Security Analysis and a Kind of Trusted BIOS.- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.- Network Security.- DDoS Attack Detection Algorithms Based on Entropy Computing.- Firewall for Dynamic IP Address in Mobile IPv6.- Application of the PageRank Algorithm to Alarm Graphs.- Drive-By Pharming.
Erscheint lt. Verlag | 29.11.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 514 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 774 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • aes • Algorithm analysis and problem complexity • authentication • block cipher • Camellia • Communication • Cryptanalysis • cryptographic protocols • cryptography • Data Security • Digital Signatures • digital watermark • DNS spoofing • DoS attacks • Firewall • Information • Information Security • Intrusion Detection • Malware • network sec • Network Security • pairings • Pharming • Phishing • privacy • security • Security Technology • side-channel attacks • Systems Security |
ISBN-10 | 3-540-77047-X / 354077047X |
ISBN-13 | 978-3-540-77047-3 / 9783540770473 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich