000 05954nam a22006495i 4500
001 978-3-540-45215-7
003 DE-He213
005 20240423132506.0
007 cr nn 008mamaa
008 121227s2003 gw | s |||| 0|eng d
020 _a9783540452157
_9978-3-540-45215-7
024 7 _a10.1007/b12005
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aComputer Network Security
_h[electronic resource] :
_bSecond International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings /
_cedited by Vladimir Gorodetsky, Leonard Popyack, Victor Skormin.
250 _a1st ed. 2003.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2003.
300 _aXIV, 478 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2776
505 0 _aInvited Papers -- ForNet: A Distributed Forensics Network -- Usage Control: A Vision for Next Generation Access Control -- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL -- Complexity Problems in the Analysis of Information Systems Security -- A Behavior-Based Approach to Securing Email Systems -- Real-Time Intrusion Detection with Emphasis on Insider Attacks -- Mathematical Models and Architectures for Computer Network Security -- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols -- GRID Security Review -- A Knowledge-Based Repository Model for Security Policies Management -- Symbolic Partial Model Checking for Security Analysis -- Rule-Based Systems Security Model -- Logical Resolving for Security Evaluation -- Intrusion Detection -- Enhanced Correlation in an Intrusion Detection Process -- Safeguarding SCADA Systems with Anomaly Detection -- Experiments with Simulation of Attacks against Computer Networks -- Detecting Malicious Codes by the Presence of Their “Gene of Self-replication” -- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences -- Public Key Distribution, Authentication, Access Control -- Distributed Access Control: A Logic-Based Approach -- Advanced Certificate Status Protocol -- Key History Tree: Efficient Group Key Management with Off-Line Members -- A Certificate Status Checking Protocol for the Authenticated Dictionary -- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach -- Cryptography -- A Signcryption Scheme Based on Secret Sharing Technique -- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem -- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.-Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper -- On Cipher Design Based on Switchable Controlled Operations -- Elliptic Curve Point Multiplication -- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation -- Steganography -- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel -- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation -- Digital Watermarking under a Filtering and Additive Noise Attack Condition -- Data Hiding in Digital Audio by Frequency Domain Dithering -- Steganography with Least Histogram Abnormality -- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences -- Short Papers -- Authentication of Anycast Communication -- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy -- Construction of the Covert Channels -- Privacy and Data Protection in Electronic Communications -- Multiplier for Public-Key Cryptosystem Based on Cellular Automata -- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols -- Alert Triage on the ROC -- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 -- Immunocomputing Model of Intrusion Detection -- Agent Platform Security Architecture -- Support Vector Machine Based ICMP Covert Channel Attack Detection -- Computer Immunology System with Variable Configuration.
650 0 _aComputer networks .
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aOperating systems (Computers).
650 0 _aInformation technology
_xManagement.
650 0 _aComputers and civilization.
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aComputer Communication Networks.
650 2 4 _aCryptology.
650 2 4 _aOperating Systems.
650 2 4 _aComputer Application in Administrative Data Processing.
650 2 4 _aComputers and Society.
650 2 4 _aIT Operations.
700 1 _aGorodetsky, Vladimir.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPopyack, Leonard.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSkormin, Victor.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540407973
776 0 8 _iPrinted edition:
_z9783662175224
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2776
856 4 0 _uhttps://doi.org/10.1007/b12005
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188346
_d188346