Cantitate/Preț
Produs

Cryptology and Network Security

Editat de David Pointcheval, Yi Mu, Kefei Chen
en Limba Engleză Paperback – 27 noi 2006

Preț: 32627 lei

Preț vechi: 40784 lei
-20% Nou

Puncte Express: 489

Preț estimativ în valută:
5774 6733$ 5069£

Carte tipărită la comandă

Livrare economică 16-30 ianuarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540494621
ISBN-10: 3540494626
Pagini: 400
Ilustrații: XIII, 384 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Encryption.- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.- Efficient Identity-Based Encryption with Tight Security Reduction.- Key Exchange.- A Diffie-Hellman Key Exchange Protocol Without Random Oracles.- Authenticated Group Key Agreement for Multicast.- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.- Authentication and Signatures.- Efficient Mutual Data Authentication Using Manually Authenticated Strings.- Achieving Multicast Stream Authentication Using MDS Codes.- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.- Proxy Signatures.- Security Model of Proxy-Multi Signature Schemes.- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.- Cryptanalysis.- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.- Improved Collision Attack on Reduced Round Camellia.- Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks.- Implementation.- Bitslice Implementation of AES.- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3).- Steganalysis and Watermarking.- Steganalysis Based on Differential Statistics.- Watermarking Essential Data Structures for Copyright Protection.- Boolean Functions and Stream Ciphers.- A Note of Perfect Nonlinear Functions.- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.- Intrusion Detection.- Cooperative Intrusion Detection for Web Applications.- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems.- A Multi-agent Cooperative Model and System for Integrated Security Monitoring.- Disponibility and Reliability.-Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network.- An Immune-Based Model for Service Survivability.- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.