Cantitate/Preț
Produs

Cryptology and Network Security: 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3810

Editat de Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li
en Limba Engleză Paperback – 30 noi 2005

Din seria Lecture Notes in Computer Science

Preț: 33588 lei

Preț vechi: 41985 lei
-20% Nou

Puncte Express: 504

Preț estimativ în valută:
6428 6673$ 5360£

Carte tipărită la comandă

Livrare economică 24 martie-07 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540308492
ISBN-10: 3540308490
Pagini: 368
Ilustrații: XII, 352 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.51 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Cryptanalysis.- The Second-Preimage Attack on MD4.- On the Security of Certificateless Signature Schemes from Asiacrypt 2003.- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.- Security Analysis of Password-Authenticated Key Agreement Protocols.- Intrusion Detection and Viruses.- An Immune-Based Model for Computer Virus Detection.- A New Model for Dynamic Intrusion Detection.- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.- Authentication and Signature.- ID-Based Aggregate Signatures from Bilinear Pairings.- Efficient Identity-Based Signatures and Blind Signatures.- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.- Signcryption.- Two Proxy Signcryption Schemes from Bilinear Pairings.- Constructing Secure Warrant-Based Proxy Signcryption Schemes.- E-mail Security.- Design and Implementation of an Inline Certified E-mail Service.- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.- Cryptosystems.- Similar Keys of Multivariate Quadratic Public Key Cryptosystems.- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.- Constructions of Almost Resilient Functions.- Privacy and Tracing.- A Novel Method to Maintain Privacy in Mobile Agent Applications.- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.- Information Hiding.- Revaluation of Error Correcting Coding in Watermarking Channel.- Firewalls, Denial of Service and DNS Security.- On the Performance and Analysis of DNS Security Extensions.- On Securing RTP-Based Streaming Content with Firewalls.- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.- Trust Management.- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.