This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertext documents to specialized cryptographic algorithms. It provides the interested reader with a spectrum of up-to-the-minute knowledge on the topics covered.
This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertext documents to specialized cryptographic algorithms. It provides the interested reader with a spectrum of up-to-the-minute knowledge on the topics covered.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
Produktdetails
IFIP Advances in Information and Communication Technology
Issues of attack in distributed systems - a generic attack model. The puzzling science of information integrity. Covered trust values in distributed systems. File server architecture for an open distributed document system. A heuristic for securing hypertext systems. Video communication - security and quality issues. The graphical interface for secure mail. The network security reference model: its security subjects and their classification criteria. A strategic approach to a national security policy. The patient card and its position in a `new health care system'. Access controls for federated database environments - taxonomy of design choices. Authorization in multimedia conferencing systems. Authentication and key distribution in computer networks and distributed systems. Hidden signature schemes based on the discrete logarithm problem and related concepts. Digital signature schemes based on Lucas functions. Power permutations on prime residue classes. Hillcipher application to Multimedia Security. From `Steganographia' to subliminal communication. On the fractal nature of the set of all binary sequences with almost perfect linear complexity profile. Index of contributors. Keyword index.
Issues of attack in distributed systems - a generic attack model. The puzzling science of information integrity. Covered trust values in distributed systems. File server architecture for an open distributed document system. A heuristic for securing hypertext systems. Video communication - security and quality issues. The graphical interface for secure mail. The network security reference model: its security subjects and their classification criteria. A strategic approach to a national security policy. The patient card and its position in a `new health care system'. Access controls for federated database environments - taxonomy of design choices. Authorization in multimedia conferencing systems. Authentication and key distribution in computer networks and distributed systems. Hidden signature schemes based on the discrete logarithm problem and related concepts. Digital signature schemes based on Lucas functions. Power permutations on prime residue classes. Hillcipher application to Multimedia Security. From `Steganographia' to subliminal communication. On the fractal nature of the set of all binary sequences with almost perfect linear complexity profile. Index of contributors. Keyword index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497