Applied Cryptography and Network Security
Editat de Jianying Zhou, Moti Yung, Feng Baoen Limba Engleză Paperback – 30 mai 2006
Preț: 632.58 lei
Preț vechi: 790.72 lei
-20% Nou
Puncte Express: 949
Preț estimativ în valută:
111.92€ • 130.59$ • 97.85£
111.92€ • 130.59$ • 97.85£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540347033
ISBN-10: 3540347038
Pagini: 508
Ilustrații: XIV, 490 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.76 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540347038
Pagini: 508
Ilustrații: XIV, 490 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.76 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Intrusion Avoidance and Detection.- Adaptive Detection of Local Scanners.- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection.- DSO: Dependable Signing Overlay.- Cryptographic Applications.- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?.- A Handy Multi-coupon System.- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families.- DoS: Attacks and Countermeasures.- Efficient Memory Bound Puzzles Using Pattern Databases.- Effect of Malicious Synchronization.- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets.- Key Management.- Password Based Server Aided Key Exchange.- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.- Stateful Subset Cover.- Cryptanalysis.- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.- Breaking a New Instance of TTM Cryptosystems.- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.- Security of Limited Devices.- An AES Smart Card Implementation Resistant to Power Analysis Attacks.- Physical Security Bounds Against Tampering.- Flexible Exponentiation with Resistance to Side Channel Attacks.- Cryptography.- An Improved Poly1305 MAC.- Certificateless Public-Key Signature: Security Model and Efficient Construction.- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive.- Authentication and Web Security.- Authentication for Paranoids: Multi-party Secret Handshakes.- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.- W3Bcrypt: Encryption as a Stylesheet.- Ad Hoc and Sensor Network Security.- Combinatorial Structures for Design of Wireless Sensor Networks.- Public Key Cryptography Sans Certificates in Ad Hoc Networks.- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks.- Cryptographic Constructions.- A GeneralMethodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography.- Results on Almost Resilient Functions.- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing.- Security and Privacy.- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries.- Improving the Randomized Initial Point Countermeasure Against DPA.- Syntax-Driven Private Evaluation of Quantified Membership Queries.