feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (2)
Type of Medium
Language
Region
Years
  • 1
    Image
    Image
    Bielefeld : Kerber Art
    UID:
    kobvindex_ZLB16286324
    Format: 144 Seiten , 26 cm x 21 cm
    Edition: 1
    ISBN: 9783735603395 , 3735603394
    Language: English
    Author information: Texas, Kinki
    Author information: Stein, Detlef W.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947363923302882
    Format: XII, 550 p. , online resource.
    ISBN: 9783540446057
    Series Statement: Lecture Notes in Computer Science, 4189
    Note: Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540446019
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages