Willkommen, schön sind Sie da!
Logo Ex Libris

Information Security and Privacy

  • E-Book (pdf)
  • 480 Seiten
(0) Erste Bewertung abgeben
Bewertungen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
Inhalt New Paradigms for Password Security.- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Orig... Weiterlesen
E-Books ganz einfach mit der kostenlosen Ex Libris-Reader-App lesen. Hier erhalten Sie Ihren Download-Link.
CHF 120.00
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.
Bestellung & Lieferung in eine Filiale möglich

Beschreibung

Inhalt

New Paradigms for Password Security.- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.- Secure Biometric Authentication with Improved Accuracy.- A Critical Analysis and Improvement of AACS Drive-Host Authentication.- Comparing the Pre- and Post-specified Peer Models for Key Agreement.- Efficient One-Round Key Exchange in the Standard Model.- On the Improvement of the BDF Attack on LSBS-RSA.- Public-Key Cryptosystems with Primitive Power Roots of Unity.- Relationship between Two Approaches for Defining the Standard Model PA-ness.- Distributed Verification of Mixing - Local Forking Proofs Model.- Fully-Simulatable Oblivious Set Transfer.- Efficient Disjointness Tests for Private Datasets.- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.- Multidimensional Linear Cryptanalysis of Reduced Round Serpent.- Cryptanalysis of Reduced-Round SMS4 Block Cipher.- On the Unprovable Security of 2-Key XCBC.- Looking Back at a New Hash Function.- Non-linear Reduced Round Attacks against SHA-2 Hash Family.- Collisions for Round-Reduced LAKE.- Preimage Attacks on Step-Reduced MD5.- Linear Distinguishing Attack on Shannon.- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck.- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128.- Signature Generation and Detection of Malware Families.- Reducing Payload Scans for Attack Signature Matching Using Rule Classification.- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor.- FormatShield: A Binary Rewriting Defense against Format String Attacks.- Advanced Permission-Role Relationship in Role-Based Access Control.- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases.- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ).- A Tree-Based Approach for Computing Double-Base Chains.- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves.- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.

Produktinformationen

Titel: Information Security and Privacy
Untertitel: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Editor:
EAN: 9783540705000
Digitaler Kopierschutz: Wasserzeichen
Format: E-Book (pdf)
Hersteller: Springer Berlin Heidelberg
Genre: IT & Internet
Anzahl Seiten: 480
Veröffentlichung: 29.06.2008
Dateigrösse: 8.7 MB

Weitere Bände aus der Buchreihe "Lecture Notes in Computer Science"