Information Security Applications
Springer Berlin (Verlag)
978-3-540-20827-3 (ISBN)
Network Security.- Model Checking of Security Protocols with Pre-configuration.- Remote Access VPN with Port Protection Function by Mobile Codes.- A Role of DEVS Simulation for Information Assurance.- Mobile Security.- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.- Reliable Cascaded Delegation Scheme for Mobile Agent Environments.- Practical Solution for Location Privacy in Mobile IPv6.- Intrusion Detection.- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection.- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System.- Towards a Global Security Architecture for Intrusion Detection and Reaction Management.- Internet Security.- Intrusion-Tolerant System Design for Web Server Survivability.- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access.- An Automatic Security Evaluation System for IPv6 Network.- Secure Software, Hardware, and Systems I.- A Location Privacy Protection Mechanism for Smart Space.- Secure System Architecture Based on Dynamic Resource Reallocation.- Fair Exchange with Guardian Angels.- Secure Software, Hardware, and Systems II.- Sign-Based Differential Power Analysis.- Asymmetric Watermarking Scheme Using Permutation Braids.- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ).- E-commerce Security.- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.- Multi-dimensional Hash Chain For Sealed-Bid Auction.- An Improved Forward Integrity Protocol for Mobile Agents.- Digital Rights Management.- Taming "Trusted Platforms" by Operating System Design.- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.- Reducing Storage at Receivers in SD and LSD Broadcast EncryptionSchemes.- Biometrics and Human Interfaces I.- 3D Face Recognition under Pose Varying Environments.- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint.- Fingerprint-Based Authentication for USB Token Systems.- Biometrics and Human Interfaces II.- Iris Recognition System Using Wavelet Packet and Support Vector Machines.- Biometrics Identification and Verification Using Projection-Based Face Recognition System.- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification.- Public Key Cryptography / Key Management.- E-MHT. An Efficient Protocol for Certificate Status Checking.- A Comment on Group Independent Threshold Sharing.- Automation-Considered Logic of Authentication and Key Distribution.- Applied Cryptography.- The MESH Block Ciphers.- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves.- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer.
Erscheint lt. Verlag | 15.1.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 512 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 780 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • applied cryptography • Architecture • biometrics • Data Security • Digital rights management • e-commerce security • human interfaces • Information • Information Security • Informationssicherheit • Intrusion Detection • Mobile Security • Model Checking • Network Security • Public Key • Public Key Cryptography • security applications • SIGNATUR • Systems Security • verification |
ISBN-10 | 3-540-20827-5 / 3540208275 |
ISBN-13 | 978-3-540-20827-3 / 9783540208273 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich