Computer Network Security [electronic resource] : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings /
Material type: TextSeries: Lecture Notes in Computer Science ; 2776Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003Edition: 1st ed. 2003Description: XIV, 478 p. online resourceContent type:- text
- computer
- online resource
- 9783540452157
- Computer networks
- Cryptography
- Data encryption (Computer science)
- Operating systems (Computers)
- Information technology -- Management
- Computers and civilization
- Electronic data processing -- Management
- Computer Communication Networks
- Cryptology
- Operating Systems
- Computer Application in Administrative Data Processing
- Computers and Society
- IT Operations
- 004.6 23
- TK5105.5-5105.9
Invited Papers -- ForNet: A Distributed Forensics Network -- Usage Control: A Vision for Next Generation Access Control -- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL -- Complexity Problems in the Analysis of Information Systems Security -- A Behavior-Based Approach to Securing Email Systems -- Real-Time Intrusion Detection with Emphasis on Insider Attacks -- Mathematical Models and Architectures for Computer Network Security -- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols -- GRID Security Review -- A Knowledge-Based Repository Model for Security Policies Management -- Symbolic Partial Model Checking for Security Analysis -- Rule-Based Systems Security Model -- Logical Resolving for Security Evaluation -- Intrusion Detection -- Enhanced Correlation in an Intrusion Detection Process -- Safeguarding SCADA Systems with Anomaly Detection -- Experiments with Simulation of Attacks against Computer Networks -- Detecting Malicious Codes by the Presence of Their “Gene of Self-replication” -- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences -- Public Key Distribution, Authentication, Access Control -- Distributed Access Control: A Logic-Based Approach -- Advanced Certificate Status Protocol -- Key History Tree: Efficient Group Key Management with Off-Line Members -- A Certificate Status Checking Protocol for the Authenticated Dictionary -- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach -- Cryptography -- A Signcryption Scheme Based on Secret Sharing Technique -- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem -- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.-Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper -- On Cipher Design Based on Switchable Controlled Operations -- Elliptic Curve Point Multiplication -- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation -- Steganography -- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel -- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation -- Digital Watermarking under a Filtering and Additive Noise Attack Condition -- Data Hiding in Digital Audio by Frequency Domain Dithering -- Steganography with Least Histogram Abnormality -- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences -- Short Papers -- Authentication of Anycast Communication -- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy -- Construction of the Covert Channels -- Privacy and Data Protection in Electronic Communications -- Multiplier for Public-Key Cryptosystem Based on Cellular Automata -- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols -- Alert Triage on the ROC -- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 -- Immunocomputing Model of Intrusion Detection -- Agent Platform Security Architecture -- Support Vector Machine Based ICMP Covert Channel Attack Detection -- Computer Immunology System with Variable Configuration.
There are no comments on this title.