Information Security
Springer Berlin (Verlag)
978-3-540-75495-4 (ISBN)
Intrusion Detection.- Detecting System Emulators.- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems.- E-NIPS: An Event-Based Network Intrusion Prediction System.- Digital Rights Management.- Enabling Fairer Digital Rights Management with Trusted Computing.- Traitor Tracing with Optimal Transmission Rate.- Symmetric-Key Cryptography.- The Security of Elastic Block Ciphers Against Key-Recovery Attacks.- Impossible-Differential Attacks on Large-Block Rijndael.- High-Speed Pipelined Hardware Architecture for Galois Counter Mode.- Cryptographic Protocols and Schemes.- Efficient Committed Oblivious Transfer of Bit Strings.- An Efficient Certified Email Protocol.- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability.- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures.- Identify-Based Cryptography.- Identity-Based Proxy Re-encryption Without Random Oracles.- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension.- Cryptanalysis.- Small Private-Exponent Attack on RSA with Primes Sharing Bits.- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.- Network Security.- Queue Management as a DoS Counter-Measure?.- Software Obfuscation.- On the Concept of Software Obfuscation in Computer Security.- Specifying Imperative Data Obfuscations.- Public-Key Cryptosystems.- Token-Controlled Public Key Encryption in the Standard Model.- Trapdoor Permutation Polynomials of ?/n? and Public Key Cryptosystems.- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring.- Towards a DL-Based Additively Homomorphic EncryptionScheme.- Elliptic Curves and Applications.- Differential Properties of Elliptic Curves and Blind Signatures.- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation.- Database Security and Privacy.- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control.- Efficient Negative Databases from Cryptographic Hash Functions.
Erscheint lt. Verlag | 20.9.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 440 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 685 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • anonymity • applied cryptography • authentication • biometrics • cryptographic algorithms • cryptographic protocols • cryptography • Database and System Security • Data Security • denial of service • Digital rights management • Economics of Security and Privacy • Formal Methods in Security • Foundations of Computer Security • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity and Trust Management • Information • infrastructure security • Network and Wireless Network Security • Peer-to-Peer Network Security • PKI and PMI • Prevention of Online Fraud • security • Security and Privacy in Pervasive Computing • Security of eCommerce, eBusiness and eGovernment • Security of Gri • Security of Grid Computing • trusted computing • Watermarking |
ISBN-10 | 3-540-75495-4 / 3540754954 |
ISBN-13 | 978-3-540-75495-4 / 9783540754954 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich