Information Security and Cryptology
Springer Berlin (Verlag)
9783540496083 (ISBN)
Digital Signature Schemes.- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.- Identity-Based Key-Insulated Signature with Secure Key-Updates.- Efficient Intrusion-Resilient Signatures Without Random Oracles.- Sequences and Stream Ciphers.- New Constructions of Large Binary Sequences Family with Low Correlation.- On the Rate of Coincidence of Two Clock-Controlled Combiners.- Symmetric-Key Cryptography.- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining.- OPMAC: One-Key Poly1305 MAC.- A General Construction of Tweakable Block Ciphers and Different Modes of Operations.- Cryptographic Schemes.- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme.- Efficient Short Signcryption Scheme with Public Verifiability.- A Revocation Scheme Preserving Privacy.- Network Security.- Deterministic Packet Marking with Link Signatures for IP Traceback.- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System.- A Network Security Policy Model and Its Realization Mechanism.- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic.- Access Control.- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty.- Design and Implementation of Fast Access Control That Supports the Separation of Duty.- Computer and Applications Security.- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models.- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks.- Application and Evaluation of Bayesian Filter for Chinese Spam.- Web and Media Security.- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes.-An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses.- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.
| Erscheint lt. Verlag | 13.11.2006 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 308 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 458 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • Algorithm analysis and problem complexity • anonymity • authentication • Block Ciphers • Cryptanalysis • cryptographic protocols • DDoS attacks • Fingerprinting • Information Hiding • Intrusion Detection • Network Security • pairings • security modeling • signatur schemes • signcryption • spam fi • spam filtering • stream chipers • symmetric keys • Systems Security • threshold cryptography • Watermarking • web security |
| ISBN-13 | 9783540496083 / 9783540496083 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich