This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.
Artikelnr. des Verlages: 86259546, 978-3-642-38032-7
2013
Seitenzahl: 404
Erscheinungstermin: 19. April 2013
Englisch
Abmessung: 235mm x 155mm x 22mm
Gewicht: 610g
ISBN-13: 9783642380327
ISBN-10: 3642380328
Artikelnr.: 37701070
Herstellerkennzeichnung
Books on Demand GmbH
In de Tarpen 42
22848 Norderstedt
info@bod.de
040 53433511
Inhaltsangabe
Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection.- Trusted Identity Management for Overlay Networks.- Situational Awareness for Improving Network Resilience Management.- Optimal Defense Strategies for DDoS defender using Bayesian Game Model.- Identity-Based Cryptography.- Attribute Specified Identity-Based Encryption.- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions.- Identity-based Multisignature with Message Recovery.- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures.- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.- About Hash into Montgomery Form Elliptic Curves.- Secure RFID Ownership Transfer Protocols.- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model.- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control.- Cryptanalysis of the OKH Authenticated Encryption Scheme.
Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection.- Trusted Identity Management for Overlay Networks.- Situational Awareness for Improving Network Resilience Management.- Optimal Defense Strategies for DDoS defender using Bayesian Game Model.- Identity-Based Cryptography.- Attribute Specified Identity-Based Encryption.- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions.- Identity-based Multisignature with Message Recovery.- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures.- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.- About Hash into Montgomery Form Elliptic Curves.- Secure RFID Ownership Transfer Protocols.- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model.- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control.- Cryptanalysis of the OKH Authenticated Encryption Scheme.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826