Buch, Englisch, Band 23, 324 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 517 g
Reihe: IFIP Advances in Information and Communication Technology
Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99) September 20-21, 1999, Leuven, Belgium
Buch, Englisch, Band 23, 324 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 517 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-1-4757-6487-1
Verlag: Springer US
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsmathematik und -statistik
- Mathematik | Informatik EDV | Informatik Informatik Mathematik für Informatiker
- Mathematik | Informatik EDV | Informatik Professionelle Anwendung
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
Network Security: ATM and ISDN.- Security On ATM Networks.- ISDN Security services.- An Alternative Access Control Architecture for IP over ATM Networks.- Applied Cryptology I.- Verifiable Democracy.- Efficient Oblivious Proofs of Correct Exponentiation.- Entity Authentication and Key Agreement Protocols.- Weaknesses in EHA Authentication and Key Distribution Protocol.- Formal Design of Efficient Authentication and Key-Agreement Protocols.- Applications.- On Authentication, Digital Signatures and Signature Laws.- Watermarking and Secure Distribution for Encrypted Video.- Implementing a Secure Log File Download Manager for the Java Card.- Network Security: IP.- Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks.- Secure Distributed Virtual Conferencing.- PIM-SM Security: Interdomain Issues and Solutions.- Protocols for Mobile Applications.- Attacks against the WAP WTLS protocol.- A New Authentication Protocol for Portable Communication Systems.- Token Based Authentication for Handover Security.- Applied Cryptology II.- How to Securely Broadcast a Secret.- Proofs of Work and Bread Pudding Protocols.- Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme.- Web Security.- Secure Data-Transfer for Web-Based Applications.- Using SESAME to Secure Web Based Applications on an Intranet.- Contributors.- Keywords.