Cryptology and Network Security
Springer Berlin (Verlag)
978-3-540-49462-1 (ISBN)
Encryption.- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.- Efficient Identity-Based Encryption with Tight Security Reduction.- Key Exchange.- A Diffie-Hellman Key Exchange Protocol Without Random Oracles.- Authenticated Group Key Agreement for Multicast.- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.- Authentication and Signatures.- Efficient Mutual Data Authentication Using Manually Authenticated Strings.- Achieving Multicast Stream Authentication Using MDS Codes.- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.- Proxy Signatures.- Security Model of Proxy-Multi Signature Schemes.- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.- Cryptanalysis.- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.- Improved Collision Attack on Reduced Round Camellia.- Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.- Implementation.- Bitslice Implementation of AES.- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3).- Steganalysis and Watermarking.- Steganalysis Based on Differential Statistics.- Watermarking Essential Data Structures for Copyright Protection.- Boolean Functions and Stream Ciphers.- A Note of Perfect Nonlinear Functions.- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.- Intrusion Detection.- Cooperative Intrusion Detection for Web Applications.- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems.- A Multi-agent Cooperative Model and System for Integrated Security Monitoring.- Disponibility and Reliability.-Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network.- An Immune-Based Model for Service Survivability.- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.
Erscheint lt. Verlag | 27.11.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 384 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 603 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • algorithm • Algorithm analysis and problem complexity • algorithms • authentication • Communication • cryotanalysis • cryptographics • Cryptology • DDoS attacks • Distributed denial of service • Encryption • Information Hiding • Intrusion Detection • IP traffic tracing • Key Management • multicast security • Networks • secure computation • secure proxy • security • side channel attacks • signature schemes • signcryption • steganalysis • Stream Ciphers • Trust • trust management • Watermarking |
ISBN-10 | 3-540-49462-6 / 3540494626 |
ISBN-13 | 978-3-540-49462-1 / 9783540494621 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich