feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV019609108
    Format: XI, 564 S. : , Ill., graph. Darst. ; , 24 cm.
    ISBN: 3-540-23563-9
    Series Statement: Lecture notes in computer science 3269
    Note: Literaturangaben
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Datensicherung ; Kryptologie ; Kryptosystem ; Internet ; Kommunikationsprotokoll ; Kryptologie ; Mensch-Maschine-System ; Anwendungssystem ; Elektronische Unterschrift ; Authentifikation ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_39642239X
    Format: XI, 564 S. , graph. Darst. , 235 mm x 155 mm
    ISBN: 3540235639
    Series Statement: Lecture notes in computer science 3269
    Content: This book constitutes the refereed proceedings of the 6th International Confrence on Information and Communications Security, ICICS 2004, held in Malaga, Spain in October 2004. The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection
    Additional Edition: Erscheint auch als Online-Ausgabe Lopez, Javier Information and Communications Security Berlin, Heidelberg : Springer Berlin Heidelberg, 2004 ISBN 9783540235637
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Datensicherung ; Kryptologie ; Kryptosystem ; Internet ; Kommunikationsprotokoll ; Kryptologie ; Mensch-Maschine-System ; Anwendungssystem ; Elektronische Unterschrift ; Authentifikation ; Datensicherung ; Kryptologie ; Kryptosystem ; Internet ; Kommunikationsprotokoll ; Kryptologie ; Mensch-Maschine-System ; Anwendungssystem ; Elektronische Unterschrift ; Authentifikation ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    kobvindex_ZBW12059809
    Format: XI, 564 Seiten
    Edition: 1
    ISBN: 3540235639
    Series Statement: Lecture notes in computer science : LNCS 3269
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    kobvindex_ZLB13819086
    Format: XI, 564 Seiten , Ill., graph. Darst. , 24 cm
    Edition: 1
    ISBN: 3540235639
    Series Statement: Lecture notes in computer science 3269
    Note: Text engl.
    Language: English
    Keywords: Datensicherung ; Kongress ; Málaga 〈2004〉 ; Kryptologie ; Kongress ; Málaga 〈2004〉 ; Kryptosystem ; Kongress ; Málaga 〈2004〉 ; Internet ; Kommunikationsprotokoll ; Kryptologie ; Kongress ; Málaga 〈2004〉 ; Mensch-Maschine-System ; Anwendungssystem ; Elektronische Unterschrift ; Authentifikation ; Kongress ; Málaga 〈2004〉 ; Kongress ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV019609108
    Format: XI, 564 S. , Ill., graph. Darst. , 24 cm
    ISBN: 3540235639
    Series Statement: Lecture notes in computer science 3269
    Note: Literaturangaben
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Datensicherung ; Kryptologie ; Kryptosystem ; Internet ; Kommunikationsprotokoll ; Kryptologie ; Mensch-Maschine-System ; Anwendungssystem ; Elektronische Unterschrift ; Authentifikation ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_749267704
    Format: Online-Ressource (XI, 564 p. Also available online) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540301912 , 3540235639 , 9783540235637
    Series Statement: Lecture Notes in Computer Science 3269
    Content: This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2004, held in Malaga, Spain in October 2004. The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection
    Additional Edition: ISBN 9783540235637
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662198094
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540235637
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Datensicherung ; Kryptologie ; Kryptosystem ; Internet ; Kommunikationsprotokoll ; Mensch-Maschine-System ; Anwendungssystem ; Elektronische Unterschrift ; Authentifikation ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9947920557302882
    Format: XII, 572 p. , online resource.
    ISBN: 9783540301912
    Series Statement: Lecture Notes in Computer Science, 3269
    Note: On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries -- A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) -- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540235637
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9948621456202882
    Format: XII, 572 p. , online resource.
    Edition: 1st ed. 2004.
    ISBN: 9783540301912
    Series Statement: Lecture Notes in Computer Science, 3269
    Note: On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux - Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries -- A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) -- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662198094
    Additional Edition: Printed edition: ISBN 9783540235637
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages