Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Computer Security - ESORICS 98 -

Computer Security - ESORICS 98

5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Online Resource
X, 382 Seiten
2005
Springer Berlin (Hersteller)
978-3-540-49784-4 (ISBN)
CHF 74,85 inkl. MwSt
  • Versand in 10-14 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

Fixed vs. variable-length patterns for detecting suspicious process behavior.- A tool for pro-active defense against the buffer overrun attack.- A kernelized architecture for multilevel secure application policies.- Dealing with multi-policy security in large open distributed systems.- A flexible method for information system security policy specification.- On the security of some variants of the RSA signature scheme.- Side channel cryptanalysis of product ciphers.- On the security of digital tachographs.- An authorization model and its formal semantics.- Authorization in CORBA security.- Rules for designing multilevel Object-Oriented Databases.- Byte code verification for Java smart cards based on model checking.- Towards formalizing the Java security architecture of JDK 1.2.- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets.- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video.- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system.- The “ticket” concept for copy control based on embedded signalling.- Panel session: Watermarking.- Authentication and payment in future mobile systems.- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks.- A mix-mediated anonymity service and its payment.- A subjective metric of authentication.- A sound logic for analysing electronic commerce protocols.- Kerberos Version IV: Inductive analysis of the secrecy goals.

Erscheint lt. Verlag 14.1.2005
Reihe/Serie Computer Science
Computer Science (R0)
Lecture Notes in Computer Science
Zusatzinfo X, 382 p.
Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Code • Communication • Computer Security • Distributed Systems • DVD • DVD-Video • Information • Kernel • rsa • security • session • Smart card
ISBN-10 3-540-49784-6 / 3540497846
ISBN-13 978-3-540-49784-4 / 9783540497844
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?