Information Security
Springer Berlin (Verlag)
978-3-540-38341-3 (ISBN)
Software Security.- Extending .NET Security to Unmanaged Code.- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.- Privacy and Anonymity.- Low Latency Anonymity with Mix Rings.- Breaking Four Mix-Related Schemes Based on Universal Re-encryption.- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy.- Protecting Data Privacy Through Hard-to-Reverse Negative Databases.- Block Ciphers and Hash Functions.- Related-Key Rectangle Attack on 42-Round SHACAL-2.- On the Collision Resistance of RIPEMD-160.- Digital Signatures.- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption.- Multi-party Concurrent Signatures.- Formal Security Model of Multisignatures.- Cryptanalysis of Variants of UOV.- Stream Ciphers.- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles.- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD's.- Encryption I.- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice.- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.- Collusion-Free Policy-Based Encryption.- Pervasive Computing.- Using Multiple Smart Cards for Signing Messages at Malicious Terminals.- Diverging Keys in Wireless Sensor Networks.- Encryption II.- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.- Transparent Image Encryption Using Progressive JPEG.- Network Security.- Preserving TCP Connections Across Host Address Changes.- A Security Architecture for Protecting LAN Interactions.- Simulation of Internet DDoS Attacks and Defense.- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.- Watermarking and DRM.- Rights Protection for Data Cubes.- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM).- IntrusionDetection and Worms.- Resistance Analysis to Intruders' Evasion of Detecting Intrusion.- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks.- Anomaly Intrusion Detection Based on Clustering a Data Stream.- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation.- Key Exchange.- An Authentication and Key Exchange Protocol for Secure Credential Services.- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.- Security Protocols and Formal Methods.- Formalising Receipt-Freeness.- Enhancing the Security and Efficiency of 3-D Secure.- Designing and Verifying Core Protocols for Location Privacy.- Information Systems Security.- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches.- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.
Erscheint lt. Verlag | 17.8.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 548 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 845 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • anonymity • authentication • Bluetooth • Code • cryptographic protocols • Data Integrity • Data Security • digital signature schemes • Distributed denial of service • DRM • Information • Information Hiding • Information Security • Network Security • privacy • Public Key Cryptography • Routing • rsa • Secure Communications • security • Smart card • Smart cards • Systems Security |
ISBN-10 | 3-540-38341-7 / 3540383417 |
ISBN-13 | 978-3-540-38341-3 / 9783540383413 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich