E-Book, Englisch, Band 7863, 388 Seiten, eBook
Deng / Feng Information Security Practice and Experience
Erscheinungsjahr 2013
ISBN: 978-3-642-38033-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings
E-Book, Englisch, Band 7863, 388 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-642-38033-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection.- Trusted Identity Management for Overlay Networks.- Situational Awareness for Improving Network Resilience Management.- Optimal Defense Strategies for DDoS defender using Bayesian Game Model.- Identity-Based Cryptography.- Attribute Specified Identity-Based Encryption.- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions.- Identity-based Multisignature with Message Recovery.- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures.- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.- About Hash into Montgomery Form Elliptic Curves.- Secure RFID Ownership Transfer Protocols.- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model.- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control.- Cryptanalysis of the OKH Authenticated Encryption Scheme.