Applied Cryptography and Network Security
Editat de Jianying Zhou, Moti Yung, Yongfei Hanen Limba Engleză Paperback – 7 oct 2003
Preț: 328.94 lei
Preț vechi: 411.17 lei
-20% Nou
Puncte Express: 493
Preț estimativ în valută:
58.21€ • 67.88$ • 51.11£
58.21€ • 67.88$ • 51.11£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540202080
ISBN-10: 3540202080
Pagini: 452
Ilustrații: XII, 440 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.68 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540202080
Pagini: 452
Ilustrații: XII, 440 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.68 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Cryptographic Applications.- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.- Optimized ? 2-Attack against RC6.- Anonymity-Enhanced Pseudonym System.- Intrusion Detection.- Using Feedback to Improve Masquerade Detection.- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.- An IP Traceback Scheme Integrating DPM and PPM.- Cryptographic Algorithms.- Improved Scalable Hash Chain Traversal.- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.- On the Security of Two Threshold Signature Schemes with Traceable Signers.- Digital Signature.- Proxy and Threshold One-Time Signatures.- A Threshold GQ Signature Scheme.- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary.- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.- Security Modelling.- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.- An Authorization Model for E-consent Requirement in a Health Care Application.- PLI: A New Framework to Protect Digital Content for P2P Networks.- Web Security.- Improved Algebraic Traitor Tracing Scheme.- Common Vulnerability Markup Language.- Trust on Web Browser: Attack vs. Defense.- Security Protocols.- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.- Using OCSP to Secure Certificate-Using Transactions in M-commerce.- Cryptanalysis.- Differential Fault Analysis on A.E.S.- Side-Channel Attack on Substitution Blocks.- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.- A Fast Correlation Attack for LFSR-Based Stream Ciphers.- Key Management.- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.- An Efficient Tree-Based Group KeyAgreement Using Bilinear Map.- A Key Recovery Mechanism for Reliable Group Key Management.- Efficient Implementations.- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.- Efficient Distributed Signcryption Scheme as Group Signcryption.- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Caracteristici
Includes supplementary material: sn.pub/extras