Cryptology and Network Security
Springer Berlin (Verlag)
978-3-540-76968-2 (ISBN)
Signatures.- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.- A Generic Construction for Universally-Convertible Undeniable Signatures.- Fast Digital Signature Algorithm Based on Subgraph Isomorphism.- Efficient ID-Based Digital Signatures with Message Recovery.- Network Security.- Achieving Mobility and Anonymity in IP-Based Networks.- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.- Forward-Secure Key Evolution in Wireless Sensor Networks.- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations.- An Intelligent Network-Warning Model with Strong Survivability.- Running on Karma - P2P Reputation and Currency Systems.- Secure Keyword Search and Private Information Retrieval.- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.- Extended Private Information Retrieval and Its Application in Biometrics Authentications.- Public Key Encryption.- Strongly Secure Certificateless Public Key Encryption Without Pairing.- Intrusion Detection.- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems.- Email Security.- How to Secure Your Email Address Book and Beyond.- Denial of Service Attacks.- Toward Non-parallelizable Client Puzzles.- Authentication.- Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
Erscheint lt. Verlag | 19.11.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 286 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 457 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Schlagworte | ad hoc network • aes • Algorithm analysis and problem complexity • algorithms • anomaly • anonymity • authentication • cryptographic protocols • DoS attacks • Encryption • group signatures • Information • Intrusion Detection • IP networks • Key Management • location privacy • micropayments • Modeling • Networks • Oracle • Peer-to-Peer • privacy • provable security • public key encryption • Reputation • secure computation • secure proxy • security • sensor networks • signature schemes • signcryption • traceable signatures • trust management • undeniable signature |
ISBN-10 | 3-540-76968-4 / 3540769684 |
ISBN-13 | 978-3-540-76968-2 / 9783540769682 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich