Computer Security - ESORICS 98
Springer Berlin (Hersteller)
978-3-540-49784-4 (ISBN)
Fixed vs. variable-length patterns for detecting suspicious process behavior.- A tool for pro-active defense against the buffer overrun attack.- A kernelized architecture for multilevel secure application policies.- Dealing with multi-policy security in large open distributed systems.- A flexible method for information system security policy specification.- On the security of some variants of the RSA signature scheme.- Side channel cryptanalysis of product ciphers.- On the security of digital tachographs.- An authorization model and its formal semantics.- Authorization in CORBA security.- Rules for designing multilevel Object-Oriented Databases.- Byte code verification for Java smart cards based on model checking.- Towards formalizing the Java security architecture of JDK 1.2.- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets.- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video.- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system.- The “ticket” concept for copy control based on embedded signalling.- Panel session: Watermarking.- Authentication and payment in future mobile systems.- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks.- A mix-mediated anonymity service and its payment.- A subjective metric of authentication.- A sound logic for analysing electronic commerce protocols.- Kerberos Version IV: Inductive analysis of the secrecy goals.
| Erscheint lt. Verlag | 14.1.2005 |
|---|---|
| Reihe/Serie | Computer Science |
| Computer Science (R0) | Lecture Notes in Computer Science |
| Zusatzinfo | X, 382 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Code • Communication • Computer Security • Distributed Systems • DVD • DVD-Video • Information • Kernel • rsa • security • session • Smart card |
| ISBN-10 | 3-540-49784-6 / 3540497846 |
| ISBN-13 | 978-3-540-49784-4 / 9783540497844 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |