Information Security
Springer Berlin (Verlag)
978-3-540-44270-7 (ISBN)
Intrusion Detection and Tamper Resistance.- Real-Time Intruder Tracing through Self-Replication.- On the Difficulty of Protecting Private Keys in Software.- Intrusion Detection with Support Vector Machines and Generative Models.- Cryptographic Algorithm and Attack Implementation.- Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI.- Fast Software Implementations of SC2000.- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512.- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.- Access Control and Trust Management (I).- Role-Based Access Control for E-commerce Sea-of-Data Applications.- An Access Control Model for Tree Data Structures.- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.- Authentication and Privacy.- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.- Quantifying Privacy Leakage through Answering Database Queries.- A New Offiine Privacy Protecting E-cash System with Revokable Anonymity.- E-commerce Protocols (I).- Receipt-Free Sealed-Bid Auction.- Exclusion-Freeness in Multi-party Exchange Protocols.- A Realistic Protocol for Multi-party Certified Electronic Mail.- Signature Schemes.- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification.- Comments to the UNCITRAL Model Law on Electronic Signatures.- An Anonymous Loan System Based on Group Signature Scheme.- Traceability Schemes for Signed Documents*.- Cryptography (I).- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications.- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m).- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m).- Access Control andTrust Management (II).- Conditional Cryptographic Delegation for P2P Data Sharing.- Certification of Public Keys within an Identity Based System.- A New Public Key Cryptosystem for Constrained Hardware.- Key Management.- A Distributed and Computationally Secure Key Distribution Scheme*.- On Optimal Hash Tree Traversal for Interval Time-Stamping.- An Efficient Dynamic and Distributed Cryptographic Accumulator*.- Security Analysis.- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.- Automated Analysis of Some Security Mechanisms of SCEP*.- An Attack on a Protocol for Certified Delivery.- E-commerce Protocols (II).- Oblivious Counter and Majority Protocol.- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.- Fingerprinting Concatenated Codes with Efficient Identification.- Cryptography (II).- A Provably Secure Additive and Multiplicative Privacy Homomorphism*.- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
Erscheint lt. Verlag | 18.9.2002 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 502 p. 28 illus., 13 illus. in color. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 152 x 229 mm |
Gewicht | 780 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • algorithms • authentication • cryptography • Data Security • Digital Payment Systems • Digital rights management • E-Commerce • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Hiding • Information Security • Network Security • PKI Infrastructure • privacy • Secure Communications • security • Systems Security • Watermarking |
ISBN-10 | 3-540-44270-7 / 3540442707 |
ISBN-13 | 978-3-540-44270-7 / 9783540442707 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich