信息安全Information security

信息安全Information security
作 者: George Davida Yair Frankel
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《信息安全Information security》作者简介

内容简介

This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2001, held in Malaga, Spain in October 2004.The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.

图书目录

Key Distribution

Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures

Privacy Amplification Theorem for Noisy Main Channel

Protocols

Efficient Kerberized Multicast in a Practical Distributed Setting

Suitability of a Classical Analysis Method for E-commerce Protocols

Enhancing Technologies

Hyppocrates (A New Proactive Password Checker)

Lenient/Strict Batch Verification in Several Groups

Privacy

Absolute Privacy in Voting

Johann-Christoph Freytag (Humboldt-Universitiit zu Berlin)

A Logical Model for Privacy Protection

Stanley Chow, Yuan Gu, Harold Johnson ( Cloakware Corporation),

Message Hiding I

A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography

Robust New Method in Frequency Domain Watermarking

PKI Issues and Protocols

On the Complexity of Public-Key Certificate Validation

Liability of Certification Authorities: A Juridical Point of View

Hardware Implementations

Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board

Elliptic Curve Arithmetic Using SIMD

……

Cryptanalysis and aPrevention

Implementaivns

Non-repudiation Techniqnes

Contrasfs and Anctions

Message HidingII

Paytrents

Security APpliications

Network and OS Security

Author Index