Information Security Applications
Editat de Chae Hoon Lim, Moti Yungen Limba Engleză Paperback – 9 feb 2005
Preț: 330.79 lei
Preț vechi: 413.49 lei
-20% Nou
Puncte Express: 496
Preț estimativ în valută:
58.52€ • 68.29$ • 51.17£
58.52€ • 68.29$ • 51.17£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540240150
ISBN-10: 3540240152
Pagini: 488
Ilustrații: XII, 474 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.73 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540240152
Pagini: 488
Ilustrații: XII, 474 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.73 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Network/Computer Security.- Impacts of Security Protocols on Real-Time Multimedia Communications.- An Improvement on Privacy and Authentication in GSM.- Encrypted Watermarks and Linux Laptop Security.- Inconsistency Detection of Authorization Policies in Distributed Component Environment.- Public Key Schemes I.- Custodian-Hiding Verifiable Encryption.- Proving Key Usage.- Public Key Encryption with Conjunctive Field Keyword Search.- Intrusion Detection I.- A Probabilistic Method for Detecting Anomalous Program Behavior.- Service Discrimination and Audit File Reduction for Effective Intrusion Detection.- IDS False Alarm Filtering Using KNN Classifier.- Watermarking/Anti-spamming.- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking.- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment.- Public Key Schemes II.- Efficient Authenticated Key Agreement Protocol for Dynamic Groups.- A Ring Signature Scheme Using Bilinear Pairings.- Verifiable Pairing and Its Applications.- Intrusion Detection II.- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading.- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks.- Application of Content Computing in Honeyfarm.- Digital Rights Management.- License Protection with a Tamper-Resistant Token.- An Adaptive Approach to Hardware Alteration for Digital Rights Management.- Dynamic Fingerprinting over Broadcast Using Revocation Scheme.- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.- e-Commerce Security.- Vulnerability of a Mobile Payment System Proposed at WISA 2002.- Fair Offline Payment Using Verifiable Encryption.- A Limited-Used Key Generation Scheme for Internet Transactions.- Efficient Implementation.- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II.- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Hyperelliptic Curve Coprocessors on a FPGA.- Anonymous Communication.- Key-Exchange Protocol Using Pre-agreed Session-ID.- A New k-Anonymous Message Transmission Protocol.- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack.- Side-Channel Attacks.- Side Channel Cryptanalysis on SEED.- Secure and Efficient AES Software Implementation for Smart Cards.- Practical Template Attacks.- Evaluation and Improvement of the Tempest Fonts.
Caracteristici
Includes supplementary material: sn.pub/extras