Communications and Multimedia Security II
Editat de Patrick Horsteren Limba Engleză Hardback – 30 sep 1996
Preț: 910.12 lei
Preț vechi: 1109.91 lei
-18% Nou
Puncte Express: 1365
Preț estimativ în valută:
161.05€ • 188.85$ • 141.44£
161.05€ • 188.85$ • 141.44£
Carte tipărită la comandă
Livrare economică 16 februarie-02 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780412797804
ISBN-10: 0412797801
Pagini: 318
Ilustrații: VII, 318 p.
Dimensiuni: 156 x 234 x 19 mm
Greutate: 0.64 kg
Ediția:1996 edition
Editura: Springer Us
Locul publicării:New York, NY, United States
ISBN-10: 0412797801
Pagini: 318
Ilustrații: VII, 318 p.
Dimensiuni: 156 x 234 x 19 mm
Greutate: 0.64 kg
Ediția:1996 edition
Editura: Springer Us
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
PLASMA platform for secure multimedia applications. High-level security issues in multimedia/hypertext systems. Approaches to security in healthcare multimedia systems. Security flows analysis of the ATM emulated LAN. Cryptoanalysis of a voting scheme. Using workflow to enhance security in federated. Anonymous mobility management for third generation mobile networks. Security concepts for the WWW. An integrated solution for secure communications over B-ISDN. Network security in a telemedicine system. On the application of image decomposition to image compression and encryption. A new approach for delegation using hierarchical delegation tokens. BEAST: a fast block cipher for arbitrary blocksizes. A WWW based certification infrastructure for secure open network transactions. Distributed registration and key distribution for online universities. Establishing a key hierarchy for conditional access without encryption. Cybermoney in the Internet: an overview over new payment systems in the Internet. A restrictive blind signature scheme with applications to electronic cash. Secure billing - incontestable charging. ISDN LAN access: remote access security and user profile management. Secure World Wide Web access to server groups. Access control system using dynamic handwriting features. Is there a need for new information security models? Attack modelling in open network. The intrusion detection system AID - architecture, and experiences in automated audit analysis. Defending Networks: the expert system components of SECURENET. Increasing firewall reliability by recording routes. Index of contributors. Keyword index.