Information and Communications Security
Editat de Petra Perner, Dieter Gollmann, Jianying Zhouen Limba Engleză Paperback – 29 sep 2003
Preț: 328.13 lei
Preț vechi: 410.16 lei
-20% Nou
Puncte Express: 492
Preț estimativ în valută:
58.06€ • 68.09$ • 50.99£
58.06€ • 68.09$ • 50.99£
Carte tipărită la comandă
Livrare economică 04-18 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540201502
ISBN-10: 3540201505
Pagini: 436
Ilustrații: X, 418 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540201505
Pagini: 436
Ilustrații: X, 418 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
A Fast Square Root Computation Using the Frobenius Mapping.- A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.- A Policy Based Framework for Access Control.- Trading-Off Type-Inference Memory Complexity against Communication.- Security Remarks on a Group Signature Scheme with Member Deletion.- An Efficient Known Plaintext Attack on FEA-M.- An Efficient Public-Key Framework.- ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.- Practical Service Charge for P2P Content Distribution.- ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback.- A Lattice Based General Blind Watermark Scheme.- Role-Based Access Control and the Access Control Matrix.- Broadcast Encryption Schemes Based on the Sectioned Key Tree.- Research on the Collusion Estimation.- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains.- Protocols for Malicious Host Revocation.- A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code.- A Novel Two-Level Trust Model for Grid.- Practical t-out-n Oblivious Transfer and Its Applications.- Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.- ID-Based Distributed “Magic Ink” Signature from Pairings.- A Simple Anonymous Fingerprinting Scheme Based on Blind Signature.- Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.- A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems.- A Novel Efficient Group Signature Scheme with Forward Security.- Variations of Diffie-Hellman Problem.- A Study on the CovertChannel Detection of TCP/IP Header Using Support Vector Machine.- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.- UC-RBAC: A Usage Constrained Role-Based Access Control Model.- (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.- An Optimized Multi-bits Blind Watermarking Scheme.- A Compound Intrusion Detection Model.- An Efficient Convertible Authenticated Encryption Scheme and Its Variant.- Space-Economical Reassembly for Intrusion Detection System.- A Functional Decomposition of Virus and Worm Programs.
Caracteristici
Includes supplementary material: sn.pub/extras