Information and Communications Security
Springer Berlin (Verlag)
978-3-540-49496-6 (ISBN)
Security Protocols.- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer.- A Robust and Secure RFID-Based Pedigree System (Short Paper).- A Topological Condition for Solving Fair Exchange in Byzantine Environments.- A Security Analysis of the Precise Time Protocol (Short Paper).- Applied Crytography.- An Identity-Based Proxy Signature Scheme from Pairings.- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper).- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size.- Trace-Driven Cache Attacks on AES (Short Paper).- Access Control and Systems Security.- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols.- Defining and Measuring Policy Coverage in Testing Access Control Policies.- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints(Short Paper).- An Operating System Design for the Security Architecture for Microprocessors.- Privacy and Malicious Code.- Point-Based Trust: Define How Much Privacy Is Worth.- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets.- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper).- An Anonymous Authentication Scheme for Identification Card.- A Wireless Covert Channel on Smart Cards (Short Paper).- Network Security.- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution.- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper).- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper).- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario.- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper).- Systems Security.- Provably Correct Runtime Enforcement of Non-interference Properties.- An Attack on SMC-Based Software Protection.- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper).- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic.- Cryptanalysis.- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper).- Seifert's RSA Fault Attack: Simplified Analysis and Generalizations.- The Fairness of Perfect Concurrent Signatures.- Applied Cryptography and Network Security.- Secure Set Membership Using 3Sat.- Left-to-Right Signed-Bit ?-Adic Representations of n Integers (Short Paper).- Universal Designated Verifier Signature Without Delegatability.- Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper).- Security Implementations.- A Fast RSA Implementation on Itanium 2 Processor.- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (ShortPaper).- Threshold Implementations Against Side-Channel Attacks and Glitches.- Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper).
Erscheint lt. Verlag | 22.11.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 562 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 971 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • authentication • Control • Cryptoanalysis • cryptographic protocol • cryptographic protocols • cryptography • Data Security • digital signature • Digital Signatures • DoS attacks • Information Security • Intrusion Detection • NC • Network Security • privacy • security • Security Engineering • security protocols • Security Technology • side-channel attacks • Systems Security • systems securtity |
ISBN-10 | 3-540-49496-0 / 3540494960 |
ISBN-13 | 978-3-540-49496-6 / 9783540494966 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich