Information Security Practice and Experience

Lieferzeit: Lieferbar innerhalb 14 Tagen

53,49 

9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14,2013, Proceedings, Lecture Notes in Computer Science 7863 – Security and Cryptology

ISBN: 3642380328
ISBN 13: 9783642380327
Herausgeber: Robert H Deng/Tao Feng
Verlag: Springer Verlag GmbH
Umfang: xiv, 388 S., 72 s/w Illustr., 388 p. 72 illus.
Erscheinungsdatum: 19.04.2013
Auflage: 1/2013
Produktform: Kartoniert
Einband: KT
Artikelnummer: 4621313 Kategorie:

Beschreibung

InhaltsangabeEnhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection.- Trusted Identity Management for Overlay Networks.- Situational Awareness for Improving Network Resilience Management.- Optimal Defense Strategies for DDoS defender using Bayesian Game Model.- Identity-Based Cryptography.- Attribute Specified Identity-Based Encryption.- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions.- Identity-based Multisignature with Message Recovery.- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures.- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.- About Hash into Montgomery Form Elliptic Curves.- Secure RFID Ownership Transfer Protocols.- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model.- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control.- Cryptanalysis of the OKH Authenticated Encryption Scheme.

Autorenporträt

InhaltsangabeEnhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection.- Trusted Identity Management for Overlay Networks.- Situational Awareness for Improving Network Resilience Management.- Optimal Defense Strategies for DDoS defender using Bayesian Game Model.- Identity-Based Cryptography.- Attribute Specified Identity-Based Encryption.- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions.- Identity-based Multisignature with Message Recovery.- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures.- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.- About Hash into Montgomery Form Elliptic Curves.- Secure RFID Ownership Transfer Protocols.- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model.- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control.- Cryptanalysis of the OKH Authenticated Encryption Scheme.

Das könnte Ihnen auch gefallen …