Applied Cryptography and Network Security
Springer Berlin (Verlag)
978-3-540-22217-0 (ISBN)
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
Security and Storage.- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.- Private Keyword-Based Push and Pull with Applications to Anonymous Communication.- Secure Conjunctive Keyword Search over Encrypted Data.- Provably Secure Constructions.- Evaluating Security of Voting Schemes in the Universal Composability Framework.- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.- On the Security of Cryptosystems with All-or-Nothing Transform.- Internet Security.- Centralized Management of Virtual Security Zones in IP Networks.- S-RIP: A Secure Distance Vector Routing Protocol.- A Pay-per-Use DoS Protection Mechanism for the Web.- Digital Signature.- Limited Verifier Signature from Bilinear Pairings.- Deniable Ring Authentication Revisited.- A Fully-Functional Group Signature Scheme over Only Known-Order Group.- Security Modelling.- Some Observations on Zap and Its Applications.- Security Measurements of Steganographic Systems.- X2Rep: Enhanced Trust Semantics for the XRep Protocol.- Authenticated Key Exchange.- One-Round Protocols for Two-Party Authenticated Key Exchange.- Password Authenticated Key Exchange Using Quadratic Residues.- Key Agreement Using Statically Keyed Authenticators.- Security of Deployed Systems.- Low-Latency Cryptographic Protection for SCADA Communications.- A Best Practice for Root CA Key Update in PKI.- SQLrand: Preventing SQL Injection Attacks.- Cryptosystems: Design and Analysis.- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.- Success Probability in ? 2-Attacks.- More Generalized Clock-Controlled Alternating Step Generator.- Cryptographic Protocols.- FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy.- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.- Side Channels and Protocol Analysis.- Security Analysis of CRT-Based Cryptosystems.- Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords.- Intrusion Detection and DoS.- Advanced Packet Marking Mechanism with Pushback for IP Traceback.- A Parallel Intrusion Detection System for High-Speed Networks.- A Novel Framework for Alert Correlation and Understanding.- Cryptographic Algorithms.- An Improved Algorithm for uP+vQ Using JSF .- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p n ).- Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Erscheint lt. Verlag | 1.6.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 510 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 800 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | applied cryptography • Communication • Cryptographic Attacks • cryptographic protocols • cryptography • Data Security • DES • digital signature schemes • Dom • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Internet Security • Intrusion Detection • Kryptographie / Kryptologie • Networks • Network Security • Netzwerksicherheit • privacy • Secure Communications • Secure Networking • security • SQL • Systems Security • web security |
ISBN-10 | 3-540-22217-0 / 3540222170 |
ISBN-13 | 978-3-540-22217-0 / 9783540222170 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich