Information Security
Editat de Josef Pieprzyk, Eiji Okamoto, Jennifer Seberryen Limba Engleză Paperback – 6 dec 2000
Preț: 324.22 lei
Preț vechi: 405.27 lei
-20%
Puncte Express: 486
Preț estimativ în valută:
57.33€ • 65.74$ • 49.55£
57.33€ • 65.74$ • 49.55£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783540414162
ISBN-10: 3540414169
Pagini: 340
Ilustrații: X, 322 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.52 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540414169
Pagini: 340
Ilustrații: X, 322 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.52 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Multimedia Copyright Protection.- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients.- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models.- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection.- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.- Region-Based Watermarking by Distribution Adjustment.- Hiding Information in Color Images Using Small Color Palettes.- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software.- Characteristics of Some Binary Codes for Fingerprinting.- E-Commerce.- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees.- Unlinkable Divisible Electronic Cash.- Weighted One-Way Hash Chain and Its Applications.- Linkability in Practical Electronic Cash Design.- Towards a Practical Secure Framework for Mobile Code Commerce.- Key Management.- Probabilistic Methods in Multicast Key Management.- Classification of Authentication Protocols: A Practical Approach.- Exploring Fair Exchange Protocols Using Specification Animation.- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.- Network Security and Access Control.- An Efficient Protocol for Certified Electronic Mail.- Performance Analysis of Secure Web Server Based on SSL.- Sherlock: Commercial High Assurance Network Computing Extended Abstract.- The Role of the Development Process in Operating System Security.- Cryptographic Systems.- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.- A Signcryption Scheme Based on Integer Factorization.