책 이미지

책 정보
· 분류 : 외국도서 > 의학 > 일반
· ISBN : 9783540647324
· 쪽수 : 432쪽
· 출판일 : 1998-07-01
목차
A review of the SESAME development.- The security of public key cryptosystems based on integer factorization.- A uniform approach to securing Unix applications using SESAME.- Integrated management of network and host based security mechanisms.- Covert distributed computing using Java through Web Spoofing.- Differential cryptanalysis of a block cipher.- On private-key cryptosystems based on product codes.- Key schedules of iterative block ciphers.- Low-cost secure server connection with limited-privilege clients.- A solution to open standard of PKI.- Comparison of commitment schemes used in mix-mediated anonymous communication for preventing pool-mode attacks.- Correlation attacks on up/down cascades.- A stream cipher based on linear feedback over GF(28).- A probabilistic correlation attack on the shrinking generator.- Bounds and constructions for A3-code with multi-senders.- Rotation-symmetric functions and fast hashing.- How to improve the nonlinearity of bijective S-boxes.- Object modeling of cryptographic algorithms with UML.- Adapting an electronic purse for internet payments.- LITESET: A light-weight secure electronic transaction protocol.- Applications of linearised and sub-linearised polynomials to information security.- Protocol failures related to order of encryption and signature computation of discrete logarithms in RSA groups.- Protection against EEPROM modification attacks.- Trends in quantum cryptography in Czech Republic.- A high level language for conventional access control models.- Fast access control decisions from delegation certificate databases.- Meta objects for access control: Role-based principals.- A dynamically typed access control model.- Efficient identity-based conference key distribution protocols.- A formal model for systematic design of key establishment protocols.- Key establishment protocols for secure mobile communications: A selective survey.- Detecting key-dependencies.- Secret sharing in multilevel and compartmented groups.- On construction of cumulative secret sharing schemes.- A comment on the efficiency of secret sharing scheme over any finite abelian group.- A user identification system using signature written with mouse.- On Zhang's nonrepudiable proxy signature schemes.