Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    almahu_BV021597915
    Umfang: XIV, 458 S.
    ISBN: 3-540-33354-1 , 978-3-540-26226-8
    Serie: Lecture notes in computer science 3935
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Kryptosystem ; Konferenzschrift ; Konferenzschrift
    Mehr zum Autor: Won, Dongho, 1949-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9947363938302882
    Umfang: XIV, 458 p. , online resource.
    ISBN: 9783540333555
    Serie: Lecture Notes in Computer Science, 3935
    Anmerkung: Invited Talks -- National Security, Forensics and Mobile Communications -- Information Security as Interdisciplinary Science Based on Ethics -- Key Management and Distributed Cryptography -- A Timed-Release Key Management Scheme for Backward Recovery -- Property-Based Broadcast Encryption for Multi-level Security Policies -- Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption -- Authentication and Biometrics -- An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image -- Trust Management for Resilient Wireless Sensor Networks -- Improvements to Mitchell’s Remote User Authentication Protocol -- Efficient Authenticators with Application to Key Exchange -- Provable Security and Primitives -- Benes and Butterfly Schemes Revisited -- Relative Doubling Attack Against Montgomery Ladder -- Improved Collision Attack on MD4 with Probability Almost 1 -- Finding Collision on 45-Step HAS-160 -- System/Network Security -- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks -- The Dilemma of Covert Channels Searching -- A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks -- Foundations of Attack Trees -- Block/Stream Ciphers (I) -- An Algebraic Masking Method to Protect AES Against Power Attacks -- Characterisations of Extended Resiliency and Extended Immunity of S-Boxes -- Integral Cryptanalysis of Reduced FOX Block Cipher -- Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components -- Block/Stream Ciphers (II) -- Cryptanalysis of Sfinks -- Weaknesses of COSvd (2,128) Stream Cipher -- Expanding Weak PRF with Small Key Size -- On Linear Systems of Equations with Distinct Variables and Small Block Size -- Efficient Implementations -- An FPGA Implementation of CCM Mode Using AES -- New Architecture for Multiplication in GF(2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography -- An Efficient Design of CCMP for Robust Security Network -- Digital Rights Management -- Software-Based Copy Protection for Temporal Media During Dissemination and Playback -- Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme -- Public Key Cryptography -- Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms -- An Efficient Static Blind Ring Signature Scheme -- Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model -- Yet Another Forward Secure Signature from Bilinear Pairings.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540333548
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    gbv_1646673751
    Umfang: Online-Ressource (XIV, 458 p. Also available online, digital)
    ISBN: 9783540333555
    Serie: Lecture Notes in Computer Science 3935
    Inhalt: Invited Talks -- National Security, Forensics and Mobile Communications -- Information Security as Interdisciplinary Science Based on Ethics -- Key Management and Distributed Cryptography -- A Timed-Release Key Management Scheme for Backward Recovery -- Property-Based Broadcast Encryption for Multi-level Security Policies -- Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption -- Authentication and Biometrics -- An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image -- Trust Management for Resilient Wireless Sensor Networks -- Improvements to Mitchell’s Remote User Authentication Protocol -- Efficient Authenticators with Application to Key Exchange -- Provable Security and Primitives -- Benes and Butterfly Schemes Revisited -- Relative Doubling Attack Against Montgomery Ladder -- Improved Collision Attack on MD4 with Probability Almost 1 -- Finding Collision on 45-Step HAS-160 -- System/Network Security -- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks -- The Dilemma of Covert Channels Searching -- A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks -- Foundations of Attack Trees -- Block/Stream Ciphers (I) -- An Algebraic Masking Method to Protect AES Against Power Attacks -- Characterisations of Extended Resiliency and Extended Immunity of S-Boxes -- Integral Cryptanalysis of Reduced FOX Block Cipher -- Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components -- Block/Stream Ciphers (II) -- Cryptanalysis of Sfinks -- Weaknesses of COSvd (2,128) Stream Cipher -- Expanding Weak PRF with Small Key Size -- On Linear Systems of Equations with Distinct Variables and Small Block Size -- Efficient Implementations -- An FPGA Implementation of CCM Mode Using AES -- New Architecture for Multiplication in GF(2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography -- An Efficient Design of CCMP for Robust Security Network -- Digital Rights Management -- Software-Based Copy Protection for Temporal Media During Dissemination and Playback -- Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme -- Public Key Cryptography -- Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms -- An Efficient Static Blind Ring Signature Scheme -- Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model -- Yet Another Forward Secure Signature from Bilinear Pairings.
    Anmerkung: Lizenzpflichtig
    Weitere Ausg.: ISBN 9783540333548
    Weitere Ausg.: Buchausg. u.d.T. ICISC (8 : 2005 : Seoul) Information security and cryptology - ICISC 2005 Berlin : Springer, 2006 ISBN 3540333541
    Weitere Ausg.: ISBN 9783540333548
    Sprache: Englisch
    Schlagwort(e): Rechnernetz ; Datensicherung ; Computersicherheit ; Kryptosystem ; Chiffrierung ; Kryptologie ; Elektronische Unterschrift ; Mobile Computing ; Datensicherung ; Rechnernetz ; Datensicherung ; Computersicherheit ; Kryptosystem ; Chiffrierung ; Kryptologie ; Elektronische Unterschrift ; Mobile Computing ; Datensicherung ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Mehr zum Autor: Won, Dongho 1949-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almahu_9949972679502882
    Umfang: XIV, 458 p. , online resource.
    Ausgabe: 1st ed. 2006.
    ISBN: 9783540333555
    Serie: Lecture Notes in Computer Science, 3935
    Anmerkung: Invited Talks -- National Security, Forensics and Mobile Communications -- Information Security as Interdisciplinary Science Based on Ethics -- Key Management and Distributed Cryptography -- A Timed-Release Key Management Scheme for Backward Recovery -- Property-Based Broadcast Encryption for Multi-level Security Policies -- Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption -- Authentication and Biometrics -- An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image -- Trust Management for Resilient Wireless Sensor Networks -- Improvements to Mitchell's Remote User Authentication Protocol -- Efficient Authenticators with Application to Key Exchange -- Provable Security and Primitives -- Benes and Butterfly Schemes Revisited -- Relative Doubling Attack Against Montgomery Ladder -- Improved Collision Attack on MD4 with Probability Almost 1 -- Finding Collision on 45-Step HAS-160 -- System/Network Security -- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks -- The Dilemma of Covert Channels Searching -- A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks -- Foundations of Attack Trees -- Block/Stream Ciphers (I) -- An Algebraic Masking Method to Protect AES Against Power Attacks -- Characterisations of Extended Resiliency and Extended Immunity of S-Boxes -- Integral Cryptanalysis of Reduced FOX Block Cipher -- Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components -- Block/Stream Ciphers (II) -- Cryptanalysis of Sfinks -- Weaknesses of COSvd (2,128) Stream Cipher -- Expanding Weak PRF with Small Key Size -- On Linear Systems of Equations with Distinct Variables and Small Block Size -- Efficient Implementations -- An FPGA Implementation of CCM Mode UsingAES -- New Architecture for Multiplication in GF(2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography -- An Efficient Design of CCMP for Robust Security Network -- Digital Rights Management -- Software-Based Copy Protection for Temporal Media During Dissemination and Playback -- Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme -- Public Key Cryptography -- Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms -- An Efficient Static Blind Ring Signature Scheme -- Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model -- Yet Another Forward Secure Signature from Bilinear Pairings.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783540333548
    Weitere Ausg.: Printed edition: ISBN 9783540822592
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    kobvindex_ZLB14033328
    Umfang: XIV, 458 Seiten , graph. Darst. , 24 cm
    ISBN: 9783540333548 , 3540333541
    Serie: Lecture notes in computer science 3935
    Anmerkung: Literaturangaben , Text engl.
    Sprache: Englisch
    Schlagwort(e): Rechnernetz ; Datensicherung ; Computersicherheit ; Kongress ; Seoul 〈2005〉 ; Kryptosystem ; Kongress ; Seoul 〈2005〉 ; Chiffrierung ; Kryptologie ; Kongress ; Seoul 〈2005〉 ; Elektronische Unterschrift ; Kongress ; Seoul 〈2005〉 ; Mobile Computing ; Datensicherung ; Kongress ; Seoul 〈2005〉 ; Kongress ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    b3kat_BV022293375
    Umfang: 1 Online-Ressource (XIV, 458 S.)
    ISBN: 3540333541 , 9783540262268
    Serie: Lecture notes in computer science 3935
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Kryptosystem ; Konferenzschrift
    Mehr zum Autor: Won, Dongho 1949-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783540133568?
Meinten Sie 9783540263548?
Meinten Sie 9783540313458?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz