Information Systems Security
Springer Berlin (Verlag)
9783540770855 (ISBN)
Keynote Address.- Security in Practice - Security-Usability Chasm.- Network Security.- Investigating the Impact of Real-World Factors on Internet Worm Propagation.- An OS Security Protection Model for Defeating Attacks from Network.- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks.- Cryptography.- Genetic Algorithm Based Steganography Using Wavelets.- Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol.- A Near Optimal S-Box Design.- Architectures and Systems.- A Software Framework for Autonomic Security in Pervasive Environments.- DLPKH - Distributed Logical Public-Key Hierarchy.- Inference Control in Logic Databases as a Constraint Satisfaction Problem.- Cryptanalysis.- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm.- Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes.- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures.- Keynote Talk.- Data Privacy - Problems and Solutions.- Protocols.- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals.- A Secure and Efficient Multi-authority Proactive Election Scheme.- Secure Transaction Management Protocols for MLS/DDBMS.- Keynote Talk.- The Curse of Ease of Access to the Internet.- Short Papers.- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document.- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks.- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks.- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation.- On Knowledge-Based Classification of Abnormal BGP Events.- Towards Automated PrivilegeSeparation.- Detection and Recognition.- Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE.- Performance Analysis for Multi Sensor Fingerprint Recognition System.- Use of Dimensionality Reduction for Intrusion Detection.
| Erscheint lt. Verlag | 29.11.2007 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 326 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 516 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Access Control • algorithms • authorization • broadcast encryption • Cellular Automata • chaotic cryptosystems • concurrency control • Data Security • denial of service • digital forensic • Distributed Computing • Inference Control • Information Hiding • Internet • Interoperability • Intrusion Detection • Network Security • P2P Systems • printer • privacy • Public-key systems • Routing • RSA cryptosystem • Scanner • secure databases • secure services • security • sensor networks • side channel analysis • System Modeling • trust management • trust models • Watermarking • web security • wireless networks |
| ISBN-13 | 9783540770855 / 9783540770855 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich