Information Security Applications
Multimedia Security.- Protecting IPTV Service Network against Malicious Rendezvous Point.- Design and Implementation of SIP-aware Security Management System.- Device Security.- Application Management Framework in User Centric Smart Card Ownership Model.- When Compromised Readers Meet RFID.- HW Implementation Security.- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?.- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.- Applied Cryptography.- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.- ID-Based Adaptive Oblivious Transfer.- Side Channel Attacks.- Unknown Plaintext Template Attacks.- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices.- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation.- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption.- Cryptograptanalysis.- Finding Collisions for a 45-Step Simplified HAS-V.- Non-linear Error Detection for Finite State Machines.- Quadratic Equations from a Kind of S-boxes.- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.- Anonymity/Authentication/Access Control.- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET.- A Selectable k-Times Relaxed Anonymous Authentication Scheme.- PUF-Based Authentication Protocols - Revisited.- Mediated Ciphertext-Policy Attribute-Based Encryption andIts Application.- Network Security.- Securing Remote Access Inside Wireless Mesh Networks.- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers.- USN Middleware Security Model.- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
| Erscheint lt. Verlag | 8.1.2010 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 386 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 608 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • Algorithm analysis and problem complexity • anonymity • authentication • broadcast • Calculus • Cryptanalysis • Cryptoanalysis • cryptographic protocol • cryptographic protocols • cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • Information Security • Logic • Network Security • privacy • Proxy • Secret Sharing • security • side channel attacks • Signatures |
| ISBN-13 | 9783642108372 / 9783642108372 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich