Information Security Applications
Editat de Kim Sehun, Moti Yung, Hyung-Woo Leeen Limba Engleză Paperback – 11 ian 2008
Preț: 326.48 lei
Preț vechi: 408.10 lei
-20%
Puncte Express: 490
Preț estimativ în valută:
57.79€ • 67.52$ • 50.16£
57.79€ • 67.52$ • 50.16£
Carte tipărită la comandă
Livrare economică 25 februarie-11 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540775348
ISBN-10: 354077534X
Pagini: 404
Ilustrații: XIII, 388 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354077534X
Pagini: 404
Ilustrații: XIII, 388 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Public Key Crypto Applications.- Universal ? T Pairing Algorithm over Arbitrary Extension Degree.- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.- Secret Signatures: How to Achieve Business Privacy Efficiently?.- Biometrics/Information Hiding.- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.- Geometrically Invariant Image Watermarking in the DWT Domain.- Secure Hardware.- Implementation of LSM-Based RBAC Module for Embedded System.- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.- Secure Systems.- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.- Detecting Motifs in System Call Sequences.- Wireless and Mobile Security.- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.- Breaking 104 Bit WEP in Less Than 60 Seconds.- Efficient Implementation of the Pairing on Mobilephones Using BREW.- Application Security/Secure Systems.- Security Analysis of MISTY1.- A Generic Method for Secure SBox Implementation.- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.- Access Control/DB Security.- Authorization Constraints Specification of RBAC.- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.- A Compositional Multiple Policies Operating System Security Model.- Smart Cards/Secure Systems.- Longer Randomly Blinded RSA KeysMay Be Weaker Than Shorter Ones.- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.- Anonymity and P2P Security.- Risk & Distortion Based K-Anonymity.- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.