Information Security Applications
Springer Berlin (Verlag)
978-3-540-24015-0 (ISBN)
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
Network/Computer Security.- Impacts of Security Protocols on Real-Time Multimedia Communications.- An Improvement on Privacy and Authentication in GSM.- Encrypted Watermarks and Linux Laptop Security.- Inconsistency Detection of Authorization Policies in Distributed Component Environment.- Public Key Schemes I.- Custodian-Hiding Verifiable Encryption.- Proving Key Usage.- Public Key Encryption with Conjunctive Field Keyword Search.- Intrusion Detection I.- A Probabilistic Method for Detecting Anomalous Program Behavior.- Service Discrimination and Audit File Reduction for Effective Intrusion Detection.- IDS False Alarm Filtering Using KNN Classifier.- Watermarking/Anti-spamming.- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking.- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment.- Public Key Schemes II.- Efficient Authenticated Key Agreement Protocol for Dynamic Groups.- A Ring Signature Scheme Using Bilinear Pairings.- Verifiable Pairing and Its Applications.- Intrusion Detection II.- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading.- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks.- Application of Content Computing in Honeyfarm.- Digital Rights Management.- License Protection with a Tamper-Resistant Token.- An Adaptive Approach to Hardware Alteration for Digital Rights Management.- Dynamic Fingerprinting over Broadcast Using Revocation Scheme.- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.- e-Commerce Security.- Vulnerability of a Mobile Payment System Proposed at WISA 2002.- Fair Offline Payment Using Verifiable Encryption.- A Limited-Used Key Generation Scheme for Internet Transactions.- Efficient Implementation.- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II.- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Hyperelliptic Curve Coprocessors on a FPGA.- Anonymous Communication.- Key-Exchange Protocol Using Pre-agreed Session-ID.- A New k-Anonymous Message Transmission Protocol.- Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack.- Side-Channel Attacks.- Side Channel Cryptanalysis on SEED.- Secure and Efficient AES Software Implementation for Smart Cards.- Practical Template Attacks.- Evaluation and Improvement of the Tempest Fonts.
Erscheint lt. Verlag | 9.2.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 474 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 680 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • anonymity • applied cryptography • Communication • Computer Security • Cryptographic Attacks • cryptographic coprocessors • Data Security • Digital Payment • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Security • Intrusion Detection • Linux • privacy • Public Key Cryptography • Secure Networking • security • Smart card • Systems Security • Watermarking |
ISBN-10 | 3-540-24015-2 / 3540240152 |
ISBN-13 | 978-3-540-24015-0 / 9783540240150 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich