Willkommen, schön sind Sie da!
Logo Ex Libris

Information Security and Privacy

  • E-Book (pdf)
  • 594 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
Inhalt Invited Talk.- All Sail, No Anchor III: Risk Aggregation and Time's Arrow.- Network Security.- Traversing Middleboxes with ... Weiterlesen
E-Books ganz einfach mit der kostenlosen Ex Libris-Reader-App lesen. Hier erhalten Sie Ihren Download-Link.
CHF 133.50
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.
Bestellung & Lieferung in eine Filiale möglich



Invited Talk.- All Sail, No Anchor III: Risk Aggregation and Time's Arrow.- Network Security.- Traversing Middleboxes with the Host Identity Protocol.- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia.- An Efficient Solution to the ARP Cache Poisoning Problem.- Cryptanalysis.- On Stern's Attack Against Secret Truncated Linear Congruential Generators.- On the Success Probability of ? 2-attack on RC6.- Solving Systems of Differential Equations of Addition.- Group Communications.- A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead.- Dynamic Group Key Agreement in Tree-Based Setting.- Immediate Data Authentication for Multicast in Resource Constrained Network.- Elliptic Curve Cryptography.- Redundant Trinomials for Finite Fields of Characteristic 2.- Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields.- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two.- Mobile Security.- Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents.- An Improved Execution Integrity Solution for Mobile Agents.- RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.- Side Channel Attacks.- Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards.- Improved Zero Value Attack on XTR.- Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks.- Evaluation and Biometrics.- SIFA: A Tool for Evaluation of High-Grade Security Devices.- Cancelable Key-Based Fingerprint Templates.- Public Key Cryptosystems.- Hybrid Signcryption Schemes with Insider Security.- On the Possibility of Constructing Meaningful Hash Collisions for Public Keys.- Tunable Balancing of RSA.- Access Control I.- Key Management for Role Hierarchy in Distributed Systems.- A Formalization of Distributed Authorization with Delegation.- Signatures I.- Two Improved Partially Blind Signature Schemes from Bilinear Pairings.- On the Security of Nominative Signatures.- Invited Talk.- Who Goes There? Internet Banking: A Matter of Risk and Reward.- Access Control II.- Role Activation Management in Role Based Access Control.- VO-Sec: An Access Control Framework for Dynamic Virtual Organization.- Threshold Cryptography.- An Efficient Implementation of a Threshold RSA Signature Scheme.- GBD Threshold Cryptography with an Application to RSA Key Recovery.- An (n-t)-out-of-n Threshold Ring Signature Scheme.- Protocols I.- Deposit-Case Attack Against Secure Roaming.- Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.- Group Signatures.- Group Signature Schemes with Membership Revocation for Large Groups.- An Efficient Group Signature Scheme from Bilinear Maps.- Group Signature Where Group Manager, Members and Open Authority Are Identity-Based.- Protocols II.- Analysis of the HIP Base Exchange Protocol.- ID-based Authenticated Key Agreement for Low-Power Mobile Devices.- Signatures II.- On the Security of Two Key-Updating Signature Schemes.- Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS.- Invited Talk.- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security.- Credentials.- Security Analysis and Fix of an Anonymous Credential System.- Counting Abuses Using Flexible Off-line Credentials.- Symmetric Cryptography.- Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity.- New Cryptographic Applications of Boolean Function Equivalence Classes.


Titel: Information Security and Privacy
Untertitel: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings
EAN: 9783540316848
Digitaler Kopierschutz: Wasserzeichen
Format: E-Book (pdf)
Hersteller: Springer Berlin Heidelberg
Genre: IT & Internet
Anzahl Seiten: 594
Veröffentlichung: 11.07.2005
Dateigrösse: 5.6 MB

Weitere Bände aus der Buchreihe "Lecture Notes in Computer Science"