Information and Communications Security
Invited Talk.- Attestation: Evidence and Trust.- Authentication.- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail.- Unclonable Lightweight Authentication Scheme.- Threat Modelling in User Performed Authentication.- Access with Fast Batch Verifiable Anonymous Credentials.- Side Channel Analysis.- Quantifying Timing Leaks and Cost Optimisation.- Method for Detecting Vulnerability to Doubling Attacks.- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements.- Cryptanalysis.- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.- Analysis of Two Attacks on Reduced-Round Versions of the SMS4.- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack.- Access Control.- Beyond User-to-User Access Control for Online Social Networks.- Revocation Schemes for Delegation Licences.- Reusability of Functionality-Based Application Confinement Policy Abstractions.- Towards Role Based Trust Management without Distributed Searching of Credentials.- Software Security.- BinHunt: Automatically Finding Semantic Differences in Binary Programs.- Enhancing Java ME Security Support with Resource Usage Monitoring.- Pseudo-randomness Inside Web Browsers.- System Security.- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data.- Embedding Renewable Cryptographic Keys into Continuous Noisy Data.- Automated Device Pairing for Asymmetric Pairing Scenarios.- Applied Cryptography.- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0..- Towards an Information Theoretic Analysis of Searchable Encryption.- A Bootstrap Attack on Digital Watermarks in the Frequency Domain.- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes.- Security Protocols.- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval.- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.- Publicly Verifiable Remote Data Integrity.
| Erscheint lt. Verlag | 8.10.2008 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 436 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 664 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity • Communication • cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Pairing • PGP • pseudo random • sha-3 • signature • watermarks |
| ISBN-13 | 9783540886242 / 9783540886242 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich