Bibliografie

Detailansicht

Information Security Practice and Experience

9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14,2013, Proceedings, Lecture Notes in Computer Science 7863 - Security and Cryptology
ISBN/EAN: 9783642380327
Umbreit-Nr.: 4621313

Sprache: Englisch
Umfang: xiv, 388 S., 72 s/w Illustr., 388 p. 72 illus.
Format in cm:
Einband: kartoniertes Buch

Erschienen am 19.04.2013
Auflage: 1/2013
€ 53,49
(inklusive MwSt.)
Lieferbar innerhalb 1 - 2 Wochen
  • Zusatztext
    • InhaltsangabeEnhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection.- Trusted Identity Management for Overlay Networks.- Situational Awareness for Improving Network Resilience Management.- Optimal Defense Strategies for DDoS defender using Bayesian Game Model.- Identity-Based Cryptography.- Attribute Specified Identity-Based Encryption.- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions.- Identity-based Multisignature with Message Recovery.- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures.- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.- About Hash into Montgomery Form Elliptic Curves.- Secure RFID Ownership Transfer Protocols.- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model.- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control.- Cryptanalysis of the OKH Authenticated Encryption Scheme.

  • Autorenportrait
    • InhaltsangabeEnhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection.- Trusted Identity Management for Overlay Networks.- Situational Awareness for Improving Network Resilience Management.- Optimal Defense Strategies for DDoS defender using Bayesian Game Model.- Identity-Based Cryptography.- Attribute Specified Identity-Based Encryption.- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions.- Identity-based Multisignature with Message Recovery.- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures.- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.- About Hash into Montgomery Form Elliptic Curves.- Secure RFID Ownership Transfer Protocols.- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model.- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control.- Cryptanalysis of the OKH Authenticated Encryption Scheme.
Lädt …