Information Security
Springer Berlin (Verlag)
978-3-540-42662-2 (ISBN)
Key Distribution.- Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures.- Privacy Amplification Theorem for Noisy Main Channel.- Protocols.- Efficient Kerberized Multicast in a Practical Distributed Setting.- Suitability of a Classical Analysis Method for E-commerce Protocols.- Enhancing Technologies.- Hyppocrates A New Proactive Password Checker.- Lenient/Strict Batch Verification in Several Groups.- Privacy.- Absolute Privacy in Voting.- A Logical Model for Privacy Protection.- Software Protection.- DISSECT: DIStribution for SECurity Tool.- An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs.- Message Hiding I.- A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography.- Robust New Method in Frequency Domain Watermarking.- PKI Issues and Protocols.- On the Complexity of Public-Key Certificate Validation.- Liability of Certification Authorities: A Juridical Point of View.- Hardware Implementations.- Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board.- Elliptic Curve Arithmetic Using SIMD.- On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms.- Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator.- Cryptanalysis and Prevention.- A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH.- Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds.- Approximate Power Roots in ?m.- Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.- Implementations.- A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems.- ASecure Publishing Service for Digital Libraries of XML Documents.- Non-repudiation Techniques.- An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party.- Persistent Authenticated Dictionaries and Their Applications.- Contracts and Auctions.- Efficient Optimistic N-Party Contract Signing Protocol.- Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison.- Message Hiding II.- Oblivious Image Watermarking Robust against Scaling and Geometric Distortions.- Fingerprinting Text in Logical Markup Languages.- Payments.- SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery.- Efficient Transferable Cash with Group Signatures.- Security Applications.- An Auditable Metering Scheme for Web Advertisement Applications.- Broker-Based Secure Negotiation of Intellectual Property Rights.- Network and OS Security.- Design of the Decision Support System for Network Security Management to Secure Enterprise Network.- Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis.- Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD.
Erscheint lt. Verlag | 19.9.2001 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 562 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 798 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • cryptographic protocols • Data Security • Digital Payment Systems • E-Commerce • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Hiding • Information Security • Network Security • PKI Infrastructure • privacy • Secure Communications • security • Systems Security |
ISBN-10 | 3-540-42662-0 / 3540426620 |
ISBN-13 | 978-3-540-42662-2 / 9783540426622 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich