What is included with this book?
Revisiting Software Protection | p. 1 |
Enabling Shared Audit Data | p. 14 |
Cryptographically Generated Addresses (CGA) | p. 29 |
Validating and Securing Spontaneous Associations between Wireless Devices | p. 44 |
Single Sign-On Using Trusted Platforms | p. 54 |
Easy Verifiable Primitives and Practical Public Key Cryptosystems | p. 69 |
Reactively Secure Signature Schemes | p. 84 |
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation | p. 96 |
A Fast Signature Scheme Based on New On-line Computation | p. 111 |
Distributed RSA Signature Schemes for General Access Structures | p. 122 |
Divisible Voting Scheme | p. 137 |
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations | p. 151 |
The Design and Implementation of Protocol-Based Hidden Key Recovery | p. 165 |
Intrinsic Limitations of Digital Signatures and How to Cope with Them | p. 180 |
On the Security of Fair Non-repudiation Protocols | p. 193 |
Security Analysis of a Password Authenticated Key Exchange Protocol | p. 208 |
Zero-Value Point Attacks on Elliptic Curve Cryptosystem | p. 218 |
Cryptanalysis of an Algebraic Privacy Homomorphism | p. 234 |
Analysis of the Insecurity of ECMQV with Partially Known Nonces | p. 240 |
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES | p. 252 |
A Note on Weak Keys of PES, IDEA, and Some Extended Variants | p. 267 |
Foundations of Differential Cryptanalysis in Abelian Groups | p. 280 |
Trust and Authorization in Pervasive B2E Scenarios | p. 295 |
A Logic Model for Temporal Authorization Delegation with Negation | p. 310 |
Zero-Distortion Authentication Watermarking | p. 325 |
Designated Verification of Non-invertible Watermark | p. 338 |
Proactive Software Tampering Detection | p. 352 |
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits | p. 366 |
Towards a Business Process-Driven Framework for Security Engineering with the UML | p. 381 |
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes | p. 396 |
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations | p. 408 |
Short c-Secure Fingerprinting Codes | p. 422 |
The Role of Arbiters in Asymmetric Authentication Schemes | p. 428 |
Author Index | p. 443 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.