Information Security Applications
Springer Berlin (Verlag)
9783540775348 (ISBN)
Public Key Crypto Applications.- Universal ? T Pairing Algorithm over Arbitrary Extension Degree.- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.- Secret Signatures: How to Achieve Business Privacy Efficiently?.- Biometrics/Information Hiding.- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.- Geometrically Invariant Image Watermarking in the DWT Domain.- Secure Hardware.- Implementation of LSM-Based RBAC Module for Embedded System.- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.- Secure Systems.- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.- Detecting Motifs in System Call Sequences.- Wireless and Mobile Security.- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.- Breaking 104 Bit WEP in Less Than 60 Seconds.- Efficient Implementation of the Pairing on Mobilephones Using BREW.- Application Security/Secure Systems.- Security Analysis of MISTY1.- A Generic Method for Secure SBox Implementation.- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.- Access Control/DB Security.- Authorization Constraints Specification of RBAC.- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.- A Compositional Multiple Policies Operating System Security Model.- Smart Cards/Secure Systems.- Longer Randomly Blinded RSA KeysMay Be Weaker Than Shorter Ones.- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.- Anonymity and P2P Security.- Risk & Distortion Based K-Anonymity.- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.
| Erscheint lt. Verlag | 11.1.2008 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 388 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 609 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • aes • algorithm • Algorithm analysis and problem complexity • algorithms • anonymity • authentication • biometrics • Block Ciphers • Cryptanalysis • Cryptographic Hardware • cryptographic protocols • Cryptology • Data Security • Digital Signatures • error-correcting code • fingerprint verification • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • Intrusion Detection • Network Security • privacy • public key systems • RDM • RFID • RFID (Radio Frequency Identificatio) • security • security analysis • sensor networks • SIGNATUR • Smart cards • Software Security • Systems Security • virus protection • Watermarking • web application security |
| ISBN-13 | 9783540775348 / 9783540775348 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich