Cantitate/Preț
Produs

Communications and Multimedia Security: IFIP Advances in Information and Communication Technology

Editat de Reinhard Posch
en Limba Engleză Hardback – 31 aug 1995
This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertext documents to specialized cryptographic algorithms. It provides the interested reader with a spectrum of up-to-the-minute knowledge on the topics covered.
Citește tot Restrânge

Din seria IFIP Advances in Information and Communication Technology

Preț: 92755 lei

Preț vechi: 113115 lei
-18% Nou

Puncte Express: 1391

Preț estimativ în valută:
17751 18439$ 14745£

Carte tipărită la comandă

Livrare economică 01-15 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780412732607
ISBN-10: 0412732602
Pagini: 224
Ilustrații: VIII, 224 p.
Dimensiuni: 156 x 234 x 19 mm
Greutate: 0.48 kg
Ediția:1995
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology

Locul publicării:New York, NY, United States

Public țintă

Research

Cuprins

Issues of attack in distributed systems - a generic attack model. The puzzling science of information integrity. Covered trust values in distributed systems. File server architecture for an open distributed document system. A heuristic for securing hypertext systems. Video communication - security and quality issues. The graphical interface for secure mail. The network security reference model: its security subjects and their classification criteria. A strategic approach to a national security policy. The patient card and its position in a `new health care system'. Access controls for federated database environments - taxonomy of design choices. Authorization in multimedia conferencing systems. Authentication and key distribution in computer networks and distributed systems. Hidden signature schemes based on the discrete logarithm problem and related concepts. Digital signature schemes based on Lucas functions. Power permutations on prime residue classes. Hillcipher application to Multimedia Security. From `Steganographia' to subliminal communication. On the fractal nature of the set of all binary sequences with almost perfect linear complexity profile. Index of contributors. Keyword index.