Information Security and Privacy
Editat de Lynn Batten, Jennifer Seberryen Limba Engleză Paperback – 19 iun 2002
Preț: 633.59 lei
Preț vechi: 791.99 lei
-20% Nou
Puncte Express: 950
Preț estimativ în valută:
112.12€ • 131.47$ • 98.46£
112.12€ • 131.47$ • 98.46£
Carte tipărită la comandă
Livrare economică 07-21 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540438618
ISBN-10: 3540438610
Pagini: 528
Ilustrații: XII, 516 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.79 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540438610
Pagini: 528
Ilustrații: XII, 516 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.79 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Key Handling.- A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields.- Security Analysis and Improvement of the Global Key Recovery System.- The LILI-II Keystream Generator.- A Secure Re-keying Scheme with Key Recovery Property.- Trust and Secret Sharing.- Modelling Trust Structures for Public Key Infrastructures.- Size of Broadcast in Threshold Schemes with Disenrollment.- Requirements for Group Independent Linear Threshold Secret Sharing Schemes.- Efficient Sharing of Encrypted Data.- Cheating Prevention in Linear Secret Sharing.- Fast Computation.- Note on Fast Computation of Secret RSA Exponents.- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying.- Cryptanalysis I.- Cryptanalysis of Stream Cipher COS (2, 128) Mode I.- The Analysis of Zheng-Seberry Scheme.- Cryptanalysis of Stream Cipher Alpha1.- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem.- Elliptic Curves.- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over .- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis.- AES.- Strengthening the Key Schedule of the AES.- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.- Security Management.- Security Management: An Information Systems Setting.- Resolving Conflicts in Authorization Delegations.- Policy Administration Domains.- Authentication.- Maintaining the Validity of Digital Signatures in B2B Applications.- Short 3-Secure Fingerprinting Codes for Copyright Protection.- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks.- Authenticated Operation of Open Computing Devices.- A New Identification SchemeBased on the Bilinear Diffie-Hellman Problem.- Invited Talk.- A Brief Outline of Research on Correlation Immune Functions.- Oblivious Transfer.- m out of n Oblivious Transfer.- Cryptanalysis II.- On the Security of Reduced Versions of 3-Pass HAVAL.- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling.- On the Security of a Modified Paillier Public-Key Primitive.- Dealing with Adversaries.- How to Play Sherlock Holmes in the World of Mobile Agents.- A Practical Approach Defeating Blackmailing.- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing.- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.
Caracteristici
Includes supplementary material: sn.pub/extras