Cantitate/Preț
Produs

Cryptology and Network Security: 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings: Lecture Notes in Computer Science, cartea 4301

Editat de David Pointcheval, Yi Mu, Kefei Chen
en Limba Engleză Paperback – 27 noi 2006

Din seria Lecture Notes in Computer Science

Preț: 39429 lei

Nou

Puncte Express: 591

Preț estimativ în valută:
7547 7849$ 6324£

Carte tipărită la comandă

Livrare economică 13-27 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540494621
ISBN-10: 3540494626
Pagini: 402
Ilustrații: XIII, 384 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.56 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Encryption.- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.- Efficient Identity-Based Encryption with Tight Security Reduction.- Key Exchange.- A Diffie-Hellman Key Exchange Protocol Without Random Oracles.- Authenticated Group Key Agreement for Multicast.- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.- Authentication and Signatures.- Efficient Mutual Data Authentication Using Manually Authenticated Strings.- Achieving Multicast Stream Authentication Using MDS Codes.- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.- Proxy Signatures.- Security Model of Proxy-Multi Signature Schemes.- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.- Cryptanalysis.- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.- Improved Collision Attack on Reduced Round Camellia.- Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks.- Implementation.- Bitslice Implementation of AES.- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3).- Steganalysis and Watermarking.- Steganalysis Based on Differential Statistics.- Watermarking Essential Data Structures for Copyright Protection.- Boolean Functions and Stream Ciphers.- A Note of Perfect Nonlinear Functions.- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.- Intrusion Detection.- Cooperative Intrusion Detection for Web Applications.- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems.- A Multi-agent Cooperative Model and System for Integrated Security Monitoring.- Disponibility and Reliability.-Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network.- An Immune-Based Model for Service Survivability.- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.