Springer Book Archives
Security and Storage.- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.- Private Keyword-Based Push and Pull with Applications to Anonymous Communication.- Secure Conjunctive Keyword Search over Encrypted Data.- Provably Secure Constructions.- Evaluating Security of Voting Schemes in the Universal Composability Framework.- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.- On the Security of Cryptosystems with All-or-Nothing Transform.- Internet Security.- Centralized Management of Virtual Security Zones in IP Networks.- S-RIP: A Secure Distance Vector Routing Protocol.- A Pay-per-Use DoS Protection Mechanism for the Web.- Digital Signature.- Limited Verifier Signature from Bilinear Pairings.- Deniable Ring Authentication Revisited.- A Fully-Functional Group Signature Scheme over Only Known-Order Group.- Security Modelling.- Some Observations on Zap and Its Applications.- Security Measurements of Steganographic Systems.- X2Rep: Enhanced Trust Semantics for the XRep Protocol.- Authenticated Key Exchange.- One-Round Protocols for Two-Party Authenticated Key Exchange.- Password Authenticated Key Exchange Using Quadratic Residues.- Key Agreement Using Statically Keyed Authenticators.- Security of Deployed Systems.- Low-Latency Cryptographic Protection for SCADA Communications.- A Best Practice for Root CA Key Update in PKI.- SQLrand: Preventing SQL Injection Attacks.- Cryptosystems: Design and Analysis.- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.- Success Probability in ? 2-Attacks.- More Generalized Clock-Controlled Alternating Step Generator.- Cryptographic Protocols.- FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy.- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.- Side Channels and Protocol Analysis.- Security Analysis of CRT-Based Cryptosystems.- Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords.- Intrusion Detection and DoS.- Advanced Packet Marking Mechanism with Pushback for IP Traceback.- A Parallel Intrusion Detection System for High-Speed Networks.- A Novel Framework for Alert Correlation and Understanding.- Cryptographic Algorithms.- An Improved Algorithm for uP+vQ Using JSF .- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p n ).- Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
![]() |
Ask a Question About this Product More... |
![]() |