日韩精品 中文字幕 动漫,91亚洲午夜一区,在线不卡日本v一区v二区丶,久久九九国产精品自在现拍

注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全信息安全I(xiàn)nformation security

信息安全I(xiàn)nformation security

信息安全I(xiàn)nformation security

定 價(jià):¥756.54

作 者: George I Davida,Yair Frankel 著
出版社: 湖南文藝出版社
叢編項(xiàng):
標(biāo) 簽: 暫缺

ISBN: 9783540426622 出版時(shí)間: 2001-12-01 包裝: 平裝
開本: 頁數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2001, held in Malaga, Spain in October 2004.The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.

作者簡(jiǎn)介

暫缺《信息安全I(xiàn)nformation security》作者簡(jiǎn)介

圖書目錄

Key Distribution
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures
Privacy Amplification Theorem for Noisy Main Channel
Protocols
Efficient Kerberized Multicast in a Practical Distributed Setting
Suitability of a Classical Analysis Method for E-commerce Protocols
Enhancing Technologies
Hyppocrates (A New Proactive Password Checker)
Lenient/Strict Batch Verification in Several Groups
Privacy
Absolute Privacy in Voting
Johann-Christoph Freytag (Humboldt-Universitiit zu Berlin)
A Logical Model for Privacy Protection
Stanley Chow, Yuan Gu, Harold Johnson ( Cloakware Corporation),
Message Hiding I
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
Robust New Method in Frequency Domain Watermarking
PKI Issues and Protocols
On the Complexity of Public-Key Certificate Validation
Liability of Certification Authorities: A Juridical Point of View
Hardware Implementations
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board
Elliptic Curve Arithmetic Using SIMD
……
Cryptanalysis and aPrevention
Implementaivns
Non-repudiation Techniqnes
Contrasfs and Anctions
Message HidingII
Paytrents
Security APpliications
Network and OS Security
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) rgspecialties.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)