Information Security Applications
Springer Berlin (Verlag)
978-3-540-77534-8 (ISBN)
Public Key Crypto Applications.- Universal ? T Pairing Algorithm over Arbitrary Extension Degree.- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.- Secret Signatures: How to Achieve Business Privacy Efficiently?.- Biometrics/Information Hiding.- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.- Geometrically Invariant Image Watermarking in the DWT Domain.- Secure Hardware.- Implementation of LSM-Based RBAC Module for Embedded System.- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.- Secure Systems.- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.- Detecting Motifs in System Call Sequences.- Wireless and Mobile Security.- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.- Breaking 104 Bit WEP in Less Than 60 Seconds.- Efficient Implementation of the Pairing on Mobilephones Using BREW.- Application Security/Secure Systems.- Security Analysis of MISTY1.- A Generic Method for Secure SBox Implementation.- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.- Access Control/DB Security.- Authorization Constraints Specification of RBAC.- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.- A Compositional Multiple Policies Operating System Security Model.- Smart Cards/Secure Systems.- Longer Randomly Blinded RSA KeysMay Be Weaker Than Shorter Ones.- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.- Anonymity and P2P Security.- Risk & Distortion Based K-Anonymity.- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.
Erscheint lt. Verlag | 11.1.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 388 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 609 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • aes • algorithm • Algorithm analysis and problem complexity • algorithms • anonymity • authentication • biometrics • Block Ciphers • Cryptanalysis • Cryptographic Hardware • cryptographic protocols • Cryptology • Data Security • Digital Signatures • error-correcting code • fingerprint verification • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • Intrusion Detection • Network Security • privacy • public key systems • RDM • RFID • RFID (Radio Frequency Identificatio) • security • security analysis • sensor networks • SIGNATUR • Smart cards • Software Security • Systems Security • virus protection • Watermarking • web application security |
ISBN-10 | 3-540-77534-X / 354077534X |
ISBN-13 | 978-3-540-77534-8 / 9783540775348 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich