did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780792386001

Secure Information Networks

by ; ;
  • ISBN13:

    9780792386001

  • ISBN10:

    0792386000

  • Format: Hardcover
  • Copyright: 1999-09-01
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $249.99 Save up to $179.45
  • Digital
    $152.83
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book presents a state-of-the-art review of current perspectives on communications and multimedia security. It examines requirements, issues, and solutions pertinent to securing information networks according to a multi-disciplinary approach covering research aspects, legal aspects, and applications. A wide spectrum of topics is discussed, including: network security (ATM, ISDN, TCP/IP); web security; protocols for entity authentication and key agreement; protocols for mobile environments; applied cryptology; watermarking; smart cards . This volume contains papers presented at the fourth Joint Working Conference on Communications and Multimedia Security (CMS'99), sponsored by the International Federation for Information Processing (IFIP) and held on September 20-21, 1999, in Leuven, Belgium. It constitutes essential reading for information security specialists, computer professionals, communication systems professionals, EDP managers and auditors, and researchers in the area.

Table of Contents

Preface ix
Conference Committees xi
Network Security: ATM and ISDN
Security On ATM Networks
3(18)
Stelios Karanastasis
Ahmed Patel
ISDN Security services
21(15)
Herbert Leitold
Karl Christian Posch
Reinhard Posch
An Alternative Access Control Architecture for IP over ATM Networks
36(17)
Olivier Paul
Maryline Laurent
Applied Cryptology I
Verifiable Democracy
53(18)
Yvo Desmedt
Brian King
Efficient Oblivious Proofs of Correct Exponentiation
71(16)
Markus Jakobsson
Claus Peter Schnorr
Entity Authentication and Key Agreement Protocols
Weaknesses in EHA Authentication and Key Distribution Protocol
87(9)
Martin Stanek
Daniel Olejar
Formal Design of Efficient Authentication and Key-Agreement Protocols
96(21)
Gunnar Jacobson
Applications
On Authentication, Digital Signatures and Signature Laws
117(14)
Per Kaijser
Watermarking and Secure Distribution for Encrypted Video
131(12)
T. Amornraksa
D.R.B. Burgess
P. Sweeney
Implementing a Secure Log File Download Manager for the Java Card
143(20)
Constantinos Markantonakis
Simeon Xenitellis
Network Security: IP
Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks
163(13)
Rolf Oppliger
Secure Distributed Virtual Conferencing
176(15)
W.A. Adamson
C.J. Antonelli
K.W. Coffman
P. McDaniel
J. Rees
PIM-SM Security: Interdomain Issues and Solutions
191(18)
Thomas Hardjono
Brad Cain
Protocols for Mobile Applications
Attacks against the WAP WTLS protocol
209(7)
Markku-Juhani Saarinen
A New Authentication Protocol for Portable Communication Systems
216(15)
Sheng-bo Xu
Cees Jansen
Henk van Tilborg
Token Based Authentication for Handover Security
231(16)
Yi Cheng
Arne Norefors
Applied Cryptology II
How to Securely Broadcast a Secret
247(11)
Jorg Schwenk
Proofs of Work and Bread Pudding Protocols
258(15)
Markus Jakobsson
Ari Juels
Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme
273(18)
Takeyuki Uehara
Reihaneh Safavi-Naini
Web Security
Secure Data-Transfer for Web-Based Applications
291(12)
Wolfgang Platzer
Using SESAME to Secure Web Based Applications on an Intranet
303(16)
Paul Ashley
Mark Vandenwauver
Joris Claessens
Contributors 319(2)
Keywords 321

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program