Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV021567349
    Format: XI, 378 S.
    ISBN: 9783540310129 , 3540310126
    Series Statement: Lecture notes in computer science 3786
    Note: Literaturangaben
    Language: English
    Keywords: Kryptoanalyse ; Zugriffskontrolle ; Kryptosystem ; Datensicherung ; Telekommunikationsnetz ; Privatsphäre ; Anonymität ; Authentifikation ; Telekommunikation ; Privatsphäre ; Anonymität ; Authentifikation ; Konferenzschrift ; Kongress ; Konferenzschrift
    Author information: Song, Joo-seok
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1646667549
    Format: Online-Ressource (XI, 378 p. Also available online, digital)
    ISBN: 9783540331537
    Series Statement: Lecture Notes in Computer Science 3786
    Content: Security Analysis and Attacks -- Security Weakness in Ren et al.’s Group Key Agreement Scheme Built on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis -- System Security -- An Alert Data Mining Framework for Network-Based Intrusion Detection System -- Key Factors Influencing Worm Infection in Enterprise Networks -- Evaluation of the Unified Modeling Language for Security Requirements Analysis -- Network Security -- A Simple and Efficient Conference Scheme for Mobile Communications -- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network -- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model -- Elastic Security QoS Provisioning for Telematics Applications -- DRM/Software Security -- An Improved Algorithm to Watermark Numeric Relational Data -- Video Fingerprinting System Using Wavelet and Error Correcting Code -- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels -- Kimchi: A Binary Rewriting Defense Against Format String Attacks -- Software Protection Through Dynamic Code Mutation -- Efficient HW Implementation -- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ) -- Developing and Implementing IHPM on IXP 425 Network Processor Platforms -- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices -- mCrypton – A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors -- Side-Channel Attacks -- Practical Modifications of Leadbitter et al.’s Repeated-Bits Side-Channel Analysis on (EC)DSA -- A DPA Countermeasure by Randomized Frobenius Decomposition -- DPA Attack on the Improved Ha-Moon Algorithm -- An Efficient Masking Scheme for AES Software Implementations -- Privacy/Anonymity -- Secure Multi-attribute Procurement Auction -- Oblivious Conjunctive Keyword Search -- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption -- Efficient Implementation -- New Concept of Authority Range for Flexible Management of Role Hierarchy -- Role-Based Access Control Model for Ubiquitous Computing Environment -- Designing Security Auditing Protocol with Web Browsers.
    Note: Lizenzpflichtig
    Additional Edition: ISBN 9783540310129
    Additional Edition: Buchausg. u.d.T. Information security applications Berlin : Springer, 2006 ISBN 3540310126
    Additional Edition: ISBN 9783540310129
    Language: English
    Keywords: Kryptoanalyse ; Zugriffskontrolle ; Kryptosystem ; Datensicherung ; Telekommunikationsnetz ; Privatsphäre ; Anonymität ; Authentifikation ; Kryptoanalyse ; Zugriffskontrolle ; Kryptosystem ; Datensicherung ; Telekommunikationsnetz ; Privatsphäre ; Anonymität ; Authentifikation ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV021501571
    Format: 1 Online-Ressource
    ISBN: 3540310126
    Series Statement: Lecture notes in computer science 3786
    Language: English
    Keywords: Kryptoanalyse ; Zugriffskontrolle ; Kryptosystem ; Datensicherung ; Telekommunikation ; Privatsphäre ; Anonymität ; Authentifikation ; Telekommunikationsnetz ; Privatsphäre ; Anonymität ; Authentifikation ; Konferenzschrift
    Author information: Song, Joo-seok
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9947363939902882
    Format: XII, 378 p. , online resource.
    ISBN: 9783540331537
    Series Statement: Lecture Notes in Computer Science, 3786
    Note: Security Analysis and Attacks -- Security Weakness in Ren et al.’s Group Key Agreement Scheme Built on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis -- System Security -- An Alert Data Mining Framework for Network-Based Intrusion Detection System -- Key Factors Influencing Worm Infection in Enterprise Networks -- Evaluation of the Unified Modeling Language for Security Requirements Analysis -- Network Security -- A Simple and Efficient Conference Scheme for Mobile Communications -- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network -- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model -- Elastic Security QoS Provisioning for Telematics Applications -- DRM/Software Security -- An Improved Algorithm to Watermark Numeric Relational Data -- Video Fingerprinting System Using Wavelet and Error Correcting Code -- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels -- Kimchi: A Binary Rewriting Defense Against Format String Attacks -- Software Protection Through Dynamic Code Mutation -- Efficient HW Implementation -- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ) -- Developing and Implementing IHPM on IXP 425 Network Processor Platforms -- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices -- mCrypton – A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors -- Side-Channel Attacks -- Practical Modifications of Leadbitter et al.’s Repeated-Bits Side-Channel Analysis on (EC)DSA -- A DPA Countermeasure by Randomized Frobenius Decomposition -- DPA Attack on the Improved Ha-Moon Algorithm -- An Efficient Masking Scheme for AES Software Implementations -- Privacy/Anonymity -- Secure Multi-attribute Procurement Auction -- Oblivious Conjunctive Keyword Search -- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption -- Efficient Implementation -- New Concept of Authority Range for Flexible Management of Role Hierarchy -- Role-Based Access Control Model for Ubiquitous Computing Environment -- Designing Security Auditing Protocol with Web Browsers.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540310129
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949972670402882
    Format: XII, 378 p. , online resource.
    Edition: 1st ed. 2006.
    ISBN: 9783540331537
    Series Statement: Security and Cryptology, 3786
    Note: Security Analysis and Attacks -- Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis -- System Security -- An Alert Data Mining Framework for Network-Based Intrusion Detection System -- Key Factors Influencing Worm Infection in Enterprise Networks -- Evaluation of the Unified Modeling Language for Security Requirements Analysis -- Network Security -- A Simple and Efficient Conference Scheme for Mobile Communications -- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network -- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model -- Elastic Security QoS Provisioning for Telematics Applications -- DRM/Software Security -- An Improved Algorithm to Watermark Numeric Relational Data -- Video Fingerprinting System Using Wavelet and Error Correcting Code -- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels -- Kimchi: A Binary Rewriting Defense Against Format String Attacks -- Software Protection Through Dynamic Code Mutation -- Efficient HW Implementation -- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ) -- Developing and Implementing IHPM on IXP 425 Network Processor Platforms -- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices -- mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors -- Side-Channel Attacks -- Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA -- A DPA Countermeasure by Randomized Frobenius Decomposition -- DPA Attack on the Improved Ha-Moon Algorithm -- An Efficient Masking Scheme for AES SoftwareImplementations -- Privacy/Anonymity -- Secure Multi-attribute Procurement Auction -- Oblivious Conjunctive Keyword Search -- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption -- Efficient Implementation -- New Concept of Authority Range for Flexible Management of Role Hierarchy -- Role-Based Access Control Model for Ubiquitous Computing Environment -- Designing Security Auditing Protocol with Web Browsers.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783540310129
    Additional Edition: Printed edition: ISBN 9783540819226
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 3534031016?
Did you mean 3540200126?
Did you mean 3504010126?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages