Information Security
Editat de Colin Boyd, Wenbo Maoen Limba Engleză Paperback – 24 sep 2003
Preț: 329.35 lei
Preț vechi: 411.69 lei
-20% Nou
Puncte Express: 494
Preț estimativ în valută:
58.28€ • 68.34$ • 51.18£
58.28€ • 68.34$ • 51.18£
Carte tipărită la comandă
Livrare economică 05-19 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540201762
ISBN-10: 3540201769
Pagini: 460
Ilustrații: XII, 448 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.69 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540201769
Pagini: 460
Ilustrații: XII, 448 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.69 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talk.- Revisiting Software Protection.- Network Security.- Enabling Shared Audit Data.- Cryptographically Generated Addresses (CGA).- Validating and Securing Spontaneous Associations between Wireless Devices.- Single Sign-On Using Trusted Platforms.- Public-Key Algorithms.- Easy Verifiable Primitives and Practical Public Key Cryptosystems.- Reactively Secure Signature Schemes.- Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation.- A Fast Signature Scheme Based on New On-line Computation.- Cryptographic Protocols.- Distributed RSA Signature Schemes for General Access Structures.- Divisible Voting Scheme.- Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.- The Design and Implementation of Protocol-Based Hidden Key Recovery.- Invited Talk.- Intrinsic Limitations of Digital Signatures and How to Cope with Them.- Protocol Attacks.- On the Security of Fair Non-repudiation Protocols.- Security Analysis of a Password Authenticated Key Exchange Protocol.- Attacks on Public Key Algorithms.- Zero-Value Point Attacks on Elliptic Curve Cryptosystem.- Cryptanalysis of an Algebraic Privacy Homomorphism.- Analysis of the Insecurity of ECMQV with Partially Known Nonces.- Block Ciphers.- Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES.- A Note on Weak Keys of PES, IDEA, and Some Extended Variants.- Foundations of Differential Cryptanalysis in Abelian Groups.- Authorization.- Trust and Authorization in Pervasive B2E Scenarios.- A Logic Model for Temporal Authorization Delegation with Negation.- Watermarking.- Zero-Distortion Authentication Watermarking.- Designated Verification of Non-invertible Watermark.- Software Security.- ProactiveSoftware Tampering Detection.- Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits.- Towards a Business Process-Driven Framework for Security Engineering with the UML.- Codes and Related Issues.- Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes.- Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.- Short c-Secure Fingerprinting Codes.- The Role of Arbiters in Asymmetric Authentication Schemes.
Caracteristici
Includes supplementary material: sn.pub/extras