Information Security Practice and Experience
Springer Berlin (Verlag)
978-3-540-33052-3 (ISBN)
Cryptoanalysis.- DPA-Resistant Finite Field Multipliers and Secure AES Design.- Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication.- Diophantine Approximation Attack on a Fast Public Key Cryptosystem.- Further Security Analysis of XTR.- Network Security I.- A Counting-Based Method for Massive Spam Mail Classification.- Model and Estimation of Worm Propagation Under Network Partition.- Tackling Worm Detection Speed and False Alarm in Virus Throttling.- Network Security II.- Using Data Field to Analyze Network Intrusions.- Adversarial Organization Modeling for Network Attack/Defense.- A Novel Dynamic Immunization Strategy for Computer Network Epidemics.- Preventing Web-Spoofing with Automatic Detecting Security Indicator.- Security Protocol.- Security Protocol Analysis with Improved Authentication Tests.- A Protocol of Member-Join in a Secret Sharing Scheme.- More on Shared-Scalar-Product Protocols.- Communication Security.- Efficient Public Key Broadcast Encryption Using Identifier of Receivers.- A Practical Clumped-Tree Multicast Encryption Scheme.- Trojan Horse Attack Strategy on Quantum Private Communication.- Signature and Key Agreement.- Linkable Democratic Group Signatures.- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings.- Short (Identity-Based) Strong Designated Verifier Signature Schemes.- Identity Based Key Insulated Signature.- Application I.- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.- A Design and Implementation of Profile Based Web Application Securing Proxy.- An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards.- Application II.- Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments.- Using?-Calculus to Formalize Domain Administration of RBAC.- An Efficient Way to Build Secure Disk.- Practical Forensic Analysis in Advanced Access Content System.- Cryptographic Techniques.- Security Analysis of a Server-Aided RSA Key Generation Protocol.- Integrating Grid with Cryptographic Computing.- Three-Round Secret Handshakes Based on ElGamal and DSA.- System Security.- Securing C Programs by Dynamic Type Checking.- A Chaos-Based Robust Software Watermarking.- Privately Retrieve Data from Large Databases.- An Empirical Study of Quality and Cost Based Security Engineering.
Erscheint lt. Verlag | 24.3.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 392 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1270 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Administration • aes • authentication • Cryptanalysis • Cryptographic Hardware • Data Security • Dom • finite field arithmetic • Hardware Implementation • Identity • Information • Information Security • Intrusion Detection • Monitor • multicast encryption • privacy • robust security • rsa • security protocol • signature schemes • Smart cards • software watermarking • Systems Security • Trust |
ISBN-10 | 3-540-33052-6 / 3540330526 |
ISBN-13 | 978-3-540-33052-3 / 9783540330523 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich