Information and Communications Security
Springer Berlin (Verlag)
978-3-540-88624-2 (ISBN)
Invited Talk.- Attestation: Evidence and Trust.- Authentication.- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail.- Unclonable Lightweight Authentication Scheme.- Threat Modelling in User Performed Authentication.- Access with Fast Batch Verifiable Anonymous Credentials.- Side Channel Analysis.- Quantifying Timing Leaks and Cost Optimisation.- Method for Detecting Vulnerability to Doubling Attacks.- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements.- Cryptanalysis.- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.- Analysis of Two Attacks on Reduced-Round Versions of the SMS4.- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack.- Access Control.- Beyond User-to-User Access Control for Online Social Networks.- Revocation Schemes for Delegation Licences.- Reusability of Functionality-Based Application Confinement Policy Abstractions.- Towards Role Based Trust Management without Distributed Searching of Credentials.- Software Security.- BinHunt: Automatically Finding Semantic Differences in Binary Programs.- Enhancing Java ME Security Support with Resource Usage Monitoring.- Pseudo-randomness Inside Web Browsers.- System Security.- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data.- Embedding Renewable Cryptographic Keys into Continuous Noisy Data.- Automated Device Pairing for Asymmetric Pairing Scenarios.- Applied Cryptography.- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0..- Towards an Information Theoretic Analysis of Searchable Encryption.- A Bootstrap Attack on Digital Watermarks in the Frequency Domain.- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes.- Security Protocols.- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval.- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.- Publicly Verifiable Remote Data Integrity.
Erscheint lt. Verlag | 8.10.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 436 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 664 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • Communication • cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Pairing • PGP • pseudo random • sha-3 • signature • watermarks |
ISBN-10 | 3-540-88624-9 / 3540886249 |
ISBN-13 | 978-3-540-88624-2 / 9783540886242 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich