Cryptology and Network Security
Editat de Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Lien Limba Engleză Paperback – 30 noi 2005
Preț: 324.63 lei
Preț vechi: 405.79 lei
-20% Nou
Puncte Express: 487
Preț estimativ în valută:
57.44€ • 67.01$ • 50.22£
57.44€ • 67.01$ • 50.22£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540308492
ISBN-10: 3540308490
Pagini: 368
Ilustrații: XII, 352 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540308490
Pagini: 368
Ilustrații: XII, 352 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Cryptanalysis.- The Second-Preimage Attack on MD4.- On the Security of Certificateless Signature Schemes from Asiacrypt 2003.- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.- Security Analysis of Password-Authenticated Key Agreement Protocols.- Intrusion Detection and Viruses.- An Immune-Based Model for Computer Virus Detection.- A New Model for Dynamic Intrusion Detection.- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.- Authentication and Signature.- ID-Based Aggregate Signatures from Bilinear Pairings.- Efficient Identity-Based Signatures and Blind Signatures.- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.- Signcryption.- Two Proxy Signcryption Schemes from Bilinear Pairings.- Constructing Secure Warrant-Based Proxy Signcryption Schemes.- E-mail Security.- Design and Implementation of an Inline Certified E-mail Service.- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.- Cryptosystems.- Similar Keys of Multivariate Quadratic Public Key Cryptosystems.- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.- Constructions of Almost Resilient Functions.- Privacy and Tracing.- A Novel Method to Maintain Privacy in Mobile Agent Applications.- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.- Information Hiding.- Revaluation of Error Correcting Coding in Watermarking Channel.- Firewalls, Denial of Service and DNS Security.- On the Performance and Analysis of DNS Security Extensions.- On Securing RTP-Based Streaming Content with Firewalls.- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.- Trust Management.- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.