Cantitate/Preț
Produs

Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings: Lecture Notes in Computer Science, cartea 1587

Editat de Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
en Limba Engleză Paperback – 17 mar 1999

Din seria Lecture Notes in Computer Science

Preț: 40467 lei

Nou

Puncte Express: 607

Preț estimativ în valută:
7745 8056$ 6491£

Carte tipărită la comandă

Livrare economică 13-27 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540657569
ISBN-10: 3540657568
Pagini: 348
Ilustrații: XII, 332 p.
Dimensiuni: 155 x 233 x 18 mm
Greutate: 0.81 kg
Ediția:1999
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Boolean Functions.- Boolean Function Design Using Hill Climbing Methods.- Enumeration of Correlation Immune Boolean Functions.- On the Symmetric Property of Homogeneous Boolean Functions.- Key Management.- Publicly Verifiable Key Escrow with Limited Time Span.- Accelerating Key Establishment Protocols for Mobile Communication.- Conference Key Agreement from Secret Sharing.- Cryptanalysis.- On m-Permutation Protection Scheme against Modification Attack.- Inversion Attack and Branching.- Signatures.- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature.- Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes.- RSA Cryptosystems.- On the Security of an RSA Based Encryption Scheme.- Generalised Cycling Attacks on RSA and Strong RSA Primes.- RSA Acceleration with Field Programmable Gate Arrays.- Group Cryptography.- Changing Thresholds in the Absence of Secure Channels.- A Self-Certified Group-Oriented Cryptosystem without a Combiner.- Network Security.- Companion Viruses and the Macintosh: Threats and Countermeasures.- An Implementation of a Secure Version of NFS Including RBAC.- Electronic Commerce.- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems.- Effient Electronic Cash Using Batch Signatures.- Evolution of Fair Non-repudiation with TTP.- Access Control.- Authorization in Object Oriented Databases.- An Analysis of Access Control Models.- Odds and Ends.- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems.- Characterization of Optimal Authentication Codes with Arbitration.- A Functional Cryptosystem Using a Group Action.

Caracteristici

Includes supplementary material: sn.pub/extras