Cryptology and Network Security (eBook, PDF)
4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
Redaktion: Desmedt, Yvo G.; Li, Yongqing; Mu, Yi; Wang, Huaxiong
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Cryptology and Network Security (eBook, PDF)
4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
Redaktion: Desmedt, Yvo G.; Li, Yongqing; Mu, Yi; Wang, Huaxiong
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 4.55MB
Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 352
- Erscheinungstermin: 24. November 2005
- Englisch
- ISBN-13: 9783540322986
- Artikelnr.: 44131167
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Yvo G. Desmedt, University College London, UK / Huaxiong Wang, Macquarie University, Sydney, NSW, Australia / Yi Mu, University of Wollongong, Sydney, NSW, Australia / Yongqing Li, Fujian Normal University, China
Cryptanalysis.- The Second-Preimage Attack on MD4.- On the Security of Certificateless Signature Schemes from Asiacrypt 2003.- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.- Security Analysis of Password-Authenticated Key Agreement Protocols.- Intrusion Detection and Viruses.- An Immune-Based Model for Computer Virus Detection.- A New Model for Dynamic Intrusion Detection.- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.- Authentication and Signature.- ID-Based Aggregate Signatures from Bilinear Pairings.- Efficient Identity-Based Signatures and Blind Signatures.- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.- Signcryption.- Two Proxy Signcryption Schemes from Bilinear Pairings.- Constructing Secure Warrant-Based Proxy Signcryption Schemes.- E-mail Security.- Design and Implementation of an Inline Certified E-mail Service.- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.- Cryptosystems.- Similar Keys of Multivariate Quadratic Public Key Cryptosystems.- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.- Constructions of Almost Resilient Functions.- Privacy and Tracing.- A Novel Method to Maintain Privacy in Mobile Agent Applications.- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.- Information Hiding.- Revaluation of Error Correcting Coding in Watermarking Channel.- Firewalls, Denial of Service and DNS Security.- On the Performance and Analysis of DNS Security Extensions.- On Securing RTP-Based Streaming Content with Firewalls.- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.- Trust Management.- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.
Cryptanalysis.- The Second-Preimage Attack on MD4.- On the Security of Certificateless Signature Schemes from Asiacrypt 2003.- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.- Security Analysis of Password-Authenticated Key Agreement Protocols.- Intrusion Detection and Viruses.- An Immune-Based Model for Computer Virus Detection.- A New Model for Dynamic Intrusion Detection.- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.- Authentication and Signature.- ID-Based Aggregate Signatures from Bilinear Pairings.- Efficient Identity-Based Signatures and Blind Signatures.- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.- Signcryption.- Two Proxy Signcryption Schemes from Bilinear Pairings.- Constructing Secure Warrant-Based Proxy Signcryption Schemes.- E-mail Security.- Design and Implementation of an Inline Certified E-mail Service.- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.- Cryptosystems.- Similar Keys of Multivariate Quadratic Public Key Cryptosystems.- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.- Constructions of Almost Resilient Functions.- Privacy and Tracing.- A Novel Method to Maintain Privacy in Mobile Agent Applications.- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.- Information Hiding.- Revaluation of Error Correcting Coding in Watermarking Channel.- Firewalls, Denial of Service and DNS Security.- On the Performance and Analysis of DNS Security Extensions.- On Securing RTP-Based Streaming Content with Firewalls.- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.- Trust Management.- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.