Advances in Information and Computer Security
Springer Berlin (Verlag)
978-3-540-75650-7 (ISBN)
Dr. Kai Rannenberg (Universität Freiburg, Institut für Informatik und Gesellschaft, Abteilung Telematik, www.iig.uni-freiburg.de/ kara) hat Informatik, Wirtschafts- und Rechtswissenschaften studiert. Er koordiniert das Kolleg "Sicherheit in der Kommunikationstechnik" der gemeinnützigen Gottlieb Daimler- und Karl Benz-Stiftung. Seit 1990 arbeitet er auf dem Gebiet IT-Sicherheitszertifizierung, u. a. bei DIN und ISO an der Normung von IT-Sicherheitsevaluationskriterien.
Software and Multimedia Security.- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.- Design Issues of an Isolated Sandbox Used to Analyze Malwares.- Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique.- Public-Key Cryptography (1).- Reduction Optimal Trinomials for Efficient Software Implementation of the ? T Pairing.- Experiments on the Linear Algebra Step in the Number Field Sieve.- Batch Pairing Delegation.- Botnet Traffic Detection Techniques by C&C Session Classification Using SVM.- A Global Authentication Scheme for Mobile Ad-Hoc Networks.- An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.- Intrusion Detection and Identification System Using Data Mining and Forensic Techniques.- Run-Time Randomization to Mitigate Tampering.- Privacy-Preserving Eigentaste-Based Collaborative Filtering.- Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks.- Verifiable Internet Voting Solving Secure Platform Problem.- Enforcement of Integrated Security Policy in Trusted Operating Systems.- Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage.- InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs.- Public-Key Cryptography (2).- Accredited Symmetrically Private Information Retrieval.- Generic Certificateless Encryption in the Standard Model.- On Security Models and Compilers for Group Key Exchange Protocols.- Processing Multi-parameter Attacktrees with Estimated Parameter Values.- Practical Security Analysis of E-Voting Systems.- Fine-Grained Sticky Provenance Architecture for Office Documents.- Secure Anonymous Communications withPractical Anonymity Revocation Scheme.- GAS: Overloading a File Sharing Network as an Anonymizing System.- A Composite Privacy Protection Model.- Nominative Signature from Ring Signature.- Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications.- How to Find Many Collisions of 3-Pass HAVAL.- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
Erscheint lt. Verlag | 8.10.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 462 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 720 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • anonymity • authentication • Computer Security • Cryptanalysis • cryptographic protocols • cryptography • Data Security • Digital Signatures • DoS attacks • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • Intrusion Detection • Mobile Security • Multimedia • Network Security • operating system • privacy • public key encryption • security • Security Engineering • Security evaluation • Security Technology • Systems Security • testing, verification and certification • Watermarking |
ISBN-10 | 3-540-75650-7 / 3540756507 |
ISBN-13 | 978-3-540-75650-7 / 9783540756507 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich