Advances in Information and Computer Security
Springer Berlin (Verlag)
9783540476993 (ISBN)
Dr. Kai Rannenberg (Universität Freiburg, Institut für Informatik und Gesellschaft, Abteilung Telematik, www.iig.uni-freiburg.de/ kara) hat Informatik, Wirtschafts- und Rechtswissenschaften studiert. Er koordiniert das Kolleg "Sicherheit in der Kommunikationstechnik" der gemeinnützigen Gottlieb Daimler- und Karl Benz-Stiftung. Seit 1990 arbeitet er auf dem Gebiet IT-Sicherheitszertifizierung, u. a. bei DIN und ISO an der Normung von IT-Sicherheitsevaluationskriterien.
Signatures (1).- ID-Based Ring Signature Scheme Secure in the Standard Model.- A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability.- Sound Computational Interpretation of Symbolic Hashes in the Standard Model.- Security Evaluation.- A Requirement Centric Framework for Information Security Evaluation.- A Model-Based Method for Security Configuration Verification.- Personal Computer Privacy: Analysis for Korean PC Users.- Signatures (2).- Short Traceable Signatures Based on Bilinear Pairings.- Ring Signature with Designated Linkability.- Ad Hoc Group Signatures.- Rateless Codes for the Multicast Stream Authentication Problem.- Authentication.- Crossing Borders: Security and Privacy Issues of the European e-Passport.- A New Approach to Hide Policy for Automated Trust Negotiation.- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.- IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.- Security for Multimedia.- A Study of Detection Method of Printed Image Alteration Using Digital Watermark.- Real-Time Watermark Embedding for High Resolution Video Watermarking.- Inhibiting Card Sharing Attacks.- Network Security.- A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction.- Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.- Modeling of Network Intrusions Based on the Multiple Transition Probability.- Encryption and Key Exchange.- Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition.- Ciphertext-Auditable Public Key Encryption.- Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.- Cryptanalysis and Implementation.- On the Effectiveness of TMTO and Exhaustive Search Attacks.- Low Power AES Hardware Architecture for Radio Frequency Identification.- The High-Speed Packet Cipher System Suitable for Small Sized Data.- Access Control.- A Tool for Managing Security Policies in Organisations.- Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.- The Complexity of Discretionary Access Control.- Traceroute Based IP Channel for Sending Hidden Short Messages.
| Erscheint lt. Verlag | 11.10.2006 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 438 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 687 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Access Control • Algorithm analysis and problem complexity • algorithms • authentication • Cryptanalysis • cryptographic protocols • Data Security • denial of service • Digital Signatures • DoS attacks • Identity • Information • Information Security • Intrusion Detection • Linux • Network Security • public key encryption • security • Security Engineering • Security evaluation • Security Technology • Symbol • systens security • Trust • verification • Watermarking |
| ISBN-13 | 9783540476993 / 9783540476993 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich