Information Security and Privacy
Springer Berlin (Verlag)
978-3-540-67742-0 (ISBN)
Network Security I.- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System.- Towards a New Authorisation Paradigm for Extranets.- Custom Safety Policies in Safe Erlang.- Public Key Cryptography.- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.- Network Security II.- High Performance Agile Crypto Modules.- A Three-Party HTTP Proxy to Support Internet Content Regulation.- Cryptographic Implementation Issues.- Cryptanalysis of the m - Permutation Protection Schemes.- An Implementation of Bitsliced DES on the Pentium MMXTM Processor.- Electronic Commerce I.- Securing Large E-Commerce Networks.- Passive Entities: A Strategy for Electronic Payment Design.- Key Recovery.- Key Recovery System for the Commercial Environment.- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication.- Public Key Infrastructure.- Key Management for Secure Multicast with Dynamic Controller.- PKI Seeks a Trusting Relationship.- The PKI Specification Dilemma: A Formal Solution.- Boolean Functions.- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator.- Security Weaknesses in a Randomized Stream Cipher.- Two-Stage Optimisation in the Design of Boolean Functions.- Intrusion Detection.- A Novel Engine for Various Intrusion Detection Methods.- Codes.- Construction and Categories of Codes.- Digital Signatures I.- Cryptanalysis of Polynomial Authentication and Signature Scheme.- Secure Transactions with Mobile Agents in Hostile Environments.- A Multisignature Scheme with Message Flexibility, Order Flexibilityand Order Verifiability.- Secret Sharing I.- Light Weight Broadcast Exclusion Using Secret Sharing.- Cheating Prevention in Secret Sharing.- On Multiplicative Secret Sharing Schemes.- Digital Signatures II.- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures.- Fail-Stop Confirmer Signatures.- An Extremely Small and Efficient Identification Scheme.- Protocols.- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme.- AKA Protocols for Mobile Communications.- Electronic Commerce II.- A Three Phased Schema for Sealed Bid Auction System Design.- An Online Public Auction Protocol Protecting Bidder Privacy.- Secret Sharing II.- Algorithms to Speed Up Computations in Threshold RSA.- Sharing Block Ciphers.- Keynote Papers.- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce.- Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society.
Erscheint lt. Verlag | 28.6.2000 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIII, 488 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 699 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • boolean function • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • Data Security • Digital Payment • Electronic Commerce • Information Security • privacy • Public Key Cryptography • secure networks • System Security |
ISBN-10 | 3-540-67742-9 / 3540677429 |
ISBN-13 | 978-3-540-67742-0 / 9783540677420 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich