Information Security
Editat de George I. Davida, Yair Frankelen Limba Engleză Paperback – 19 sep 2001
Preț: 336.29 lei
Preț vechi: 420.36 lei
-20%
Puncte Express: 504
Preț estimativ în valută:
59.47€ • 68.19$ • 51.39£
59.47€ • 68.19$ • 51.39£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783540426622
ISBN-10: 3540426620
Pagini: 576
Ilustrații: XIV, 562 p.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.86 kg
Ediția:2001
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540426620
Pagini: 576
Ilustrații: XIV, 562 p.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.86 kg
Ediția:2001
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Key Distribution.- Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures.- Privacy Amplification Theorem for Noisy Main Channel.- Protocols.- Efficient Kerberized Multicast in a Practical Distributed Setting.- Suitability of a Classical Analysis Method for E-commerce Protocols.- Enhancing Technologies.- Hyppocrates A New Proactive Password Checker.- Lenient/Strict Batch Verification in Several Groups.- Privacy.- Absolute Privacy in Voting.- A Logical Model for Privacy Protection.- Software Protection.- DISSECT: DIStribution for SECurity Tool.- An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs.- Message Hiding I.- A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography.- Robust New Method in Frequency Domain Watermarking.- PKI Issues and Protocols.- On the Complexity of Public-Key Certificate Validation.- Liability of Certification Authorities: A Juridical Point of View.- Hardware Implementations.- Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board.- Elliptic Curve Arithmetic Using SIMD.- On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms.- Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator.- Cryptanalysis and Prevention.- A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH.- Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds.- Approximate Power Roots in ?m.- Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.- Implementations.- A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems.- ASecure Publishing Service for Digital Libraries of XML Documents.- Non-repudiation Techniques.- An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party.- Persistent Authenticated Dictionaries and Their Applications.- Contracts and Auctions.- Efficient Optimistic N-Party Contract Signing Protocol.- Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison.- Message Hiding II.- Oblivious Image Watermarking Robust against Scaling and Geometric Distortions.- Fingerprinting Text in Logical Markup Languages.- Payments.- SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery.- Efficient Transferable Cash with Group Signatures.- Security Applications.- An Auditable Metering Scheme for Web Advertisement Applications.- Broker-Based Secure Negotiation of Intellectual Property Rights.- Network and OS Security.- Design of the Decision Support System for Network Security Management to Secure Enterprise Network.- Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis.- Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD.