Buch, Englisch, 438 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 689 g
Reihe: Security and Cryptology
First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings
Buch, Englisch, 438 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 689 g
Reihe: Security and Cryptology
ISBN: 978-3-540-47699-3
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Programmierung: Methoden und Allgemeines
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Signatures (1).- ID-Based Ring Signature Scheme Secure in the Standard Model.- A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability.- Sound Computational Interpretation of Symbolic Hashes in the Standard Model.- Security Evaluation.- A Requirement Centric Framework for Information Security Evaluation.- A Model-Based Method for Security Configuration Verification.- Personal Computer Privacy: Analysis for Korean PC Users.- Signatures (2).- Short Traceable Signatures Based on Bilinear Pairings.- Ring Signature with Designated Linkability.- Ad Hoc Group Signatures.- Rateless Codes for the Multicast Stream Authentication Problem.- Authentication.- Crossing Borders: Security and Privacy Issues of the European e-Passport.- A New Approach to Hide Policy for Automated Trust Negotiation.- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.- IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.- Security for Multimedia.- A Study of Detection Method of Printed Image Alteration Using Digital Watermark.- Real-Time Watermark Embedding for High Resolution Video Watermarking.- Inhibiting Card Sharing Attacks.- Network Security.- A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction.- Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.- Modeling of Network Intrusions Based on the Multiple Transition Probability.- Encryption and Key Exchange.- Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition.- Ciphertext-Auditable Public Key Encryption.- Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.- Cryptanalysis and Implementation.- On the Effectiveness of TMTO and Exhaustive Search Attacks.- Low Power AES Hardware Architecture for Radio Frequency Identification.- The High-Speed Packet Cipher System Suitable for Small Sized Data.- Access Control.- A Tool for Managing Security Policies in Organisations.- Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.- The Complexity of Discretionary Access Control.- Traceroute Based IP Channel for Sending Hidden Short Messages.