Applied Cryptography and Network Security
Editat de John Ioannidis, Angelos D. Keromytis, Moti Yungen Limba Engleză Paperback – 30 mai 2005
Preț: 634.60 lei
Preț vechi: 793.25 lei
-20% Nou
Puncte Express: 952
Preț estimativ în valută:
112.30€ • 130.96$ • 98.60£
112.30€ • 130.96$ • 98.60£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540262237
ISBN-10: 3540262237
Pagini: 548
Ilustrații: XII, 530 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.82 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540262237
Pagini: 548
Ilustrații: XII, 530 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.82 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Two-Server Password-Only Authenticated Key Exchange.- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.- A Traitor Tracing Scheme Based on RSA for Fast Decryption.- N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.- Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records.- Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.- Searching for High-Value Rare Events with Uncheatable Grid Computing.- Digital Signatures Do Not Guarantee Exclusive Ownership.- Thompson’s Group and Public Key Cryptography.- Rainbow, a New Multivariable Polynomial Signature Scheme.- Badger – A Fast and Provably Secure MAC.- IDS False Alarm Reduction Using Continuous and Discontinuous Patterns.- Indexing Information for Data Forensics.- Model Generalization and Its Implications on Intrusion Detection.- Intrusion-Resilient Secure Channels.- Optimal Asymmetric Encryption and Signature Paddings.- Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.- Identity Based Encryption Without Redundancy.- OACerts: Oblivious Attribute Certificates.- Dynamic k-Times Anonymous Authentication.- Efficient Anonymous Roaming and Its Security Analysis.- Quantifying Security in Hybrid Cellular Networks.- Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications.- Building Reliable Mix Networks with Fair Exchange.- SCARE of the DES.- Robust Key Extraction from Physical Uncloneable Functions.- Efficient Constructions for One-Way Hash Chains.- Privacy Preserving Keyword Searches on Remote Encrypted Data.- An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption.- Non-interactive Zero-Knowledge Arguments for Voting.- Short Signature and Universal Designated Verifier Signature Without Random Oracles.- Efficient Identity Based Ring Signature.- New Signature Schemes with Coupons and Tight Reduction.
Caracteristici
Includes supplementary material: sn.pub/extras