Kategorien
Konto
Anmelden / Registrieren
Warenkorb
 
 

Computer Network Security


Menge:  Stück  
Produktinformationen
cover
cover
Artikel-Nr.:
     858A-9783540407973
Hersteller:
     Springer Verlag
Herst.-Nr.:
     9783540407973
EAN/GTIN:
     9783540407973
Suchbegriffe:
Allgemeine Informatikbücher
Bücher für Datenbanken - englischsp...
Datenbanken (Fachbücher)
Datenbankenbücher
Invited Papers.- ForNet: A Distributed Forensics Network.- Usage Control: A Vision for Next Generation Access Control.- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.- Complexity Problems in the Analysis of Information Systems Security.- A Behavior-Based Approach to Securing Email Systems.- Real-Time Intrusion Detection with Emphasis on Insider Attacks.- Mathematical Models and Architectures for Computer Network Security.- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.- GRID Security Review.- A Knowledge-Based Repository Model for Security Policies Management.- Symbolic Partial Model Checking for Security Analysis.- Rule-Based Systems Security Model.- Logical Resolving for Security Evaluation.- Intrusion Detection.- Enhanced Correlation in an Intrusion Detection Process.- Safeguarding SCADA Systems with Anomaly Detection.- Experiments with Simulation of Attacks against Computer Networks.- Detecting Malicious Codes by the Presence of Their "Gene of Self-replication".- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences.- Public Key Distribution, Authentication, Access Control.- Distributed Access Control: A Logic-Based Approach.- Advanced Certificate Status Protocol.- Key History Tree: Efficient Group Key Management with Off-Line Members.- A Certificate Status Checking Protocol for the Authenticated Dictionary.- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach.- Cryptography.- A Signcryption Scheme Based on Secret Sharing Technique.- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem.- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.-Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper.- On Cipher Design Based on Switchable Controlled Operations.- Elliptic Curve Point Multiplication.- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.- Steganography.- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel.- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.- Digital Watermarking under a Filtering and Additive Noise Attack Condition.- Data Hiding in Digital Audio by Frequency Domain Dithering.- Steganography with Least Histogram Abnormality.- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.- Short Papers.- Authentication of Anycast Communication.- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.- Construction of the Covert Channels.- Privacy and Data Protection in Electronic Communications.- Multiplier for Public-Key Cryptosystem Based on Cellular Automata.- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols.- Alert Triage on the ROC.- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64.- Immunocomputing Model of Intrusion Detection.- Agent Platform Security Architecture.- Support Vector Machine Based ICMP Covert Channel Attack Detection.- Computer Immunology System with Variable Configuration.
Weitere Informationen:
Author:
Vladimir Gorodetsky; Leonard Popyack; Victor Skormin
Verlag:
Springer Berlin
Sprache:
eng
Weitere Suchbegriffe: allgemeine Informatikbücher - englischsprachig, allgemeine informatikbücher - englischsprachig, Datensicherheit / Netz, Access control; authentication; Computer cryptography; Data information intrusion detection; Privacy; Secure Communications; secure networking; security; systems security, access control, authentication, computer network security, computer security, cryptography, data security, information security, intrusion detection, network security
Die Konditionen im Überblick1
Lieferzeit
Lagerstand
Preis
€ 49,99*
Konditionen selbst auswählen
Artikel empfehlenArtikel merken
* Preise mit Sternchen sind Nettopreise zzgl. gesetzlich gültiger MwSt.
UVP bedeutet „Unverbindliche Preisempfehlung“
Unser Angebot richtet sich ausschließlich an Unternehmen, Gewerbetreibende und Freiberufler.