Information and Communication Security
Editat de Vijay Varadharajan, Yi Muen Limba Engleză Paperback – 20 oct 1999
Preț: 323.41 lei
Preț vechi: 404.26 lei
-20%
Puncte Express: 485
Preț estimativ în valută:
57.26€ • 66.67$ • 49.74£
57.26€ • 66.67$ • 49.74£
Carte tipărită la comandă
Livrare economică 23 februarie-09 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540666820
ISBN-10: 3540666826
Pagini: 344
Ilustrații: XII, 328 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.52 kg
Ediția:1999
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540666826
Pagini: 344
Ilustrații: XII, 328 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.52 kg
Ediția:1999
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Keynote Speech.- International Cryptography.- Cryptanalysis.- Reaction Attacks against Several Public-Key Cryptosystem.- Cryptanalysis of Some AES Candidate Algorithms.- Language Based Approach to Security.- Issues in the Design of a Language for Role Based Access Control.- Extending Erlang for Safe Mobile Code Execution.- Electronic Commerce and Secret Sharing.- Detachable Electronic Coins.- Linear Secret Sharing with Divisible Shares.- Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery.- Digital Signatures.- Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.- Signature Scheme for Controlled Environments.- On the Cryptographic Value of the q th Root Problem.- Keynote Speech.- Protecting Critical Information Systems.- Security Protocols.- Delegation Chains Secure Up to Constant Length.- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.- Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack.- An Extended Logic for Analyzing Timed-Release Public-Key Protocols.- Applications.- Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project.- User Identification System Based on Biometrics for Keystroke.- Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards.- Send Message into a Definite Future.- Cryptography.- Efficient Accumulators without Trapdoor Extended Abstract.- Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.- Incremental Authentication of Tree-Structured Documents.- Complexity and Security Functions.- Plateaued Functions.- On the Linear Complexity of the Naor-Reingold Pseudo-Random Function.- On the Channel Capacity of Narrow-Band Subliminal Channels.
Caracteristici
Includes supplementary material: sn.pub/extras