Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almafu_BV013785695
    Format: XI, 522 S. : Ill., graph. Darst.
    ISBN: 3-540-42300-1
    Series Statement: Lecture notes in computer science 2119
    Language: English
    Keywords: Datensicherung ; Computersicherheit ; Kryptologie ; Authentifikation ; Konferenzschrift ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_336906773
    Format: Online-Ressource, xi, 522 p., text and images
    Edition: [Elektronische Ressource]
    Edition: Reproduktion 2001 Springer eBook collection. Computer science
    ISBN: 3540477195 , 9783540477198
    Series Statement: Lecture notes in computer science 2119
    Additional Edition: ISBN 3540423001
    Additional Edition: ISBN 9783540423003
    Language: English
    Keywords: Datensicherung ; Computersicherheit ; Kryptologie ; Authentifikation ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947920533102882
    Format: XI, 522 p. , online resource.
    ISBN: 9783540477198
    Series Statement: Lecture Notes in Computer Science, 2119
    Note: A Few Thoughts on E-Commerce -- New CBC-MAC Forgery Attacks -- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000 -- Improved Cryptanalysis of the Self-Shrinking Generator -- Attacks Based on Small Factors in Various Group Structures -- On Classifying Conference Key Distribution Protocols -- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI -- New Public-Key Cryptosystem Using Divisor Class Groups -- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields -- Practical Key Recovery Schemes -- Non-deterministic Processors -- Personal Secure Booting -- Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules -- A Strategy for MLS Workflow -- Condition-Driven Integration of Security Services -- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes -- Secure and Private Distribution of Online Video and Some Related Cryptographic Issues -- Private Information Retrieval Based on the Subgroup Membership Problem -- A Practical English Auction with One-Time Registration -- A User Authentication Scheme with Identity and Location Privacy -- An End-to-End Authentication Protocol in Wireless Application Protocol -- Error Detection and Authentication in Quantum Key Distribution -- An Axiomatic Basis for Reasoning about Trust in PKIs -- A Knowledge-Based Approach to Internet Authorizations -- Applications of Trusted Review to Information Security -- Network Security Modeling and Cyber Attack Simulation Methodology -- Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks -- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS -- Improving the Availability of Time-Stamping Services -- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group -- Democratic Systems -- Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme -- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates -- How to Construct Fail-Stop Confirmer Signature Schemes -- Signature Schemes Based on 3rd Order Shift Registers -- Anonymous Statistical Survey of Attributes -- Secure Mobile Agent Using Strong Non-designated Proxy Signature -- Elliptic Curve Based Password Authenticated Key Exchange Protocols -- Elliptic Curve Cryptography on a Palm OS Device -- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540423003
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948621652402882
    Format: XI, 522 p. , online resource.
    Edition: 1st ed. 2001.
    ISBN: 9783540477198
    Series Statement: Lecture Notes in Computer Science, 2119
    Note: A Few Thoughts on E-Commerce -- New CBC-MAC Forgery Attacks -- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000 -- Improved Cryptanalysis of the Self-Shrinking Generator -- Attacks Based on Small Factors in Various Group Structures -- On Classifying Conference Key Distribution Protocols -- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI -- New Public-Key Cryptosystem Using Divisor Class Groups -- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields -- Practical Key Recovery Schemes -- Non-deterministic Processors -- Personal Secure Booting -- Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules -- A Strategy for MLS Workflow -- Condition-Driven Integration of Security Services -- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes -- Secure and Private Distribution of Online Video and Some Related Cryptographic Issues -- Private Information Retrieval Based on the Subgroup Membership Problem -- A Practical English Auction with One-Time Registration -- A User Authentication Scheme with Identity and Location Privacy -- An End-to-End Authentication Protocol in Wireless Application Protocol -- Error Detection and Authentication in Quantum Key Distribution -- An Axiomatic Basis for Reasoning about Trust in PKIs -- A Knowledge-Based Approach to Internet Authorizations -- Applications of Trusted Review to Information Security -- Network Security Modeling and Cyber Attack Simulation Methodology -- Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks -- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS -- Improving the Availability of Time-Stamping Services -- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group -- Democratic Systems -- Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme -- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates -- How to Construct Fail-Stop Confirmer Signature Schemes -- Signature Schemes Based on 3rd Order Shift Registers -- Anonymous Statistical Survey of Attributes -- Secure Mobile Agent Using Strong Non-designated Proxy Signature -- Elliptic Curve Based Password Authenticated Key Exchange Protocols -- Elliptic Curve Cryptography on a Palm OS Device -- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783540829508
    Additional Edition: Printed edition: ISBN 9783540423003
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1646448634
    Format: Online-Ressource , v.: digital
    ISBN: 9783540477198
    Series Statement: Lecture Notes in Computer Science 2119
    Content: A Few Thoughts on E-Commerce -- New CBC-MAC Forgery Attacks -- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000 -- Improved Cryptanalysis of the Self-Shrinking Generator -- Attacks Based on Small Factors in Various Group Structures -- On Classifying Conference Key Distribution Protocols -- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI -- New Public-Key Cryptosystem Using Divisor Class Groups -- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields -- Practical Key Recovery Schemes -- Non-deterministic Processors -- Personal Secure Booting -- Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules -- A Strategy for MLS Workflow -- Condition-Driven Integration of Security Services -- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes -- Secure and Private Distribution of Online Video and Some Related Cryptographic Issues -- Private Information Retrieval Based on the Subgroup Membership Problem -- A Practical English Auction with One-Time Registration -- A User Authentication Scheme with Identity and Location Privacy -- An End-to-End Authentication Protocol in Wireless Application Protocol -- Error Detection and Authentication in Quantum Key Distribution -- An Axiomatic Basis for Reasoning about Trust in PKIs -- A Knowledge-Based Approach to Internet Authorizations -- Applications of Trusted Review to Information Security -- Network Security Modeling and Cyber Attack Simulation Methodology -- Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks -- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS -- Improving the Availability of Time-Stamping Services -- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group -- Democratic Systems -- Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme -- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates -- How to Construct Fail-Stop Confirmer Signature Schemes -- Signature Schemes Based on 3rd Order Shift Registers -- Anonymous Statistical Survey of Attributes -- Secure Mobile Agent Using Strong Non-designated Proxy Signature -- Elliptic Curve Based Password Authenticated Key Exchange Protocols -- Elliptic Curve Cryptography on a Palm OS Device -- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.
    Note: In: Springer-Online
    Additional Edition: ISBN 9783540423003
    Additional Edition: Buchausg. u.d.T. Information security and privacy Berlin [u.a.] : Springer, 2001 ISBN 3540423001
    Language: English
    Keywords: Datensicherung ; Computersicherheit ; Kryptologie ; Authentifikation ; Datensicherung ; Computersicherheit ; Kryptologie ; Authentifikation ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Mu, Yi 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783520423030?
Did you mean 9783540323013?
Did you mean 9783540042303?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages