Preneel | Secure Information Networks | Buch | 978-1-4757-6487-1 | sack.de

Buch, Englisch, Band 23, 324 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 517 g

Reihe: IFIP Advances in Information and Communication Technology

Preneel

Secure Information Networks

Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS¿99) September 20¿21, 1999, Leuven, Belgium

Buch, Englisch, Band 23, 324 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 517 g

Reihe: IFIP Advances in Information and Communication Technology

ISBN: 978-1-4757-6487-1
Verlag: Springer US


This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) IT Sicherheit conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The Conference aims to provide an international forum for presentations and discussions on protocols and techniques for providing secure information networks. The contributions in this volume review the state-of­ the-art in communications and multimedia security, and discuss practical of topics experiences and new developments. They cover a wide spectrum inc1uding network security, web security, protocols for entity authentication and key agreement, protocols for mobile environments, applied cryptology, watermarking, smart cards, and legal aspects of digital signatures.
Preneel Secure Information Networks jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Network Security: ATM and ISDN.- Security On ATM Networks.- ISDN Security services.- An Alternative Access Control Architecture for IP over ATM Networks.- Applied Cryptology I.- Verifiable Democracy.- Efficient Oblivious Proofs of Correct Exponentiation.- Entity Authentication and Key Agreement Protocols.- Weaknesses in EHA Authentication and Key Distribution Protocol.- Formal Design of Efficient Authentication and Key-Agreement Protocols.- Applications.- On Authentication, Digital Signatures and Signature Laws.- Watermarking and Secure Distribution for Encrypted Video.- Implementing a Secure Log File Download Manager for the Java Card.- Network Security: IP.- Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks.- Secure Distributed Virtual Conferencing.- PIM-SM Security: Interdomain Issues and Solutions.- Protocols for Mobile Applications.- Attacks against the WAP WTLS protocol.- A New Authentication Protocol for Portable Communication Systems.- Token Based Authentication for Handover Security.- Applied Cryptology II.- How to Securely Broadcast a Secret.- Proofs of Work and Bread Pudding Protocols.- Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme.- Web Security.- Secure Data-Transfer for Web-Based Applications.- Using SESAME to Secure Web Based Applications on an Intranet.- Contributors.- Keywords.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.