ID-based ring signature scheme secure in the standard model | p. 1 |
A short verifier-local revocation group signature scheme with backward unlinkability | p. 17 |
Sound computational interpretation of symbolic hashes in the standard model | p. 33 |
A requirement centric framework for information security evaluation | p. 48 |
A model-based method for security configuration verification | p. 60 |
Personal computer privacy : analysis for Korean PC users | p. 76 |
Short traceable signatures based on bilinear pairings | p. 88 |
Ring signature with designated linkability | p. 104 |
Ad hoc group signatures | p. 120 |
Rateless codes for the multicast stream authentication problem | p. 136 |
Crossing borders : security and privacy issues of the European e-passport | p. 152 |
A new approach to hide policy for automated trust negotiation | p. 168 |
Towards remote policy enforcement for runtime protection of mobile code using trusted computing | p. 179 |
IP address authorization for secure address proxying using multi-key CGAs and ring signatures | p. 196 |
A study of detection method of printed image alteration using digital watermark | p. 212 |
Real-time watermark embedding for high resolution video watermarking | p. 227 |
Inhibiting card sharing attacks | p. 239 |
A flooding-based DoS/DDoS detecting algorithm based on traffic measurement and prediction | p. 252 |
Hardware stack design : towards an effective defence against frame pointer overwrite attacks | p. 268 |
Modeling of network intrusions based on the multiple transition probability | p. 278 |
Chosen ciphertext security from identity-based encryption without strong condition | p. 292 |
Ciphertext-auditable public key encryption | p. 308 |
Provably-secure two-round password-authenticated group key exchange in the standard model | p. 322 |
On the effectiveness of TMTO and exhaustive search attacks | p. 337 |
Low power AES hardware architecture for radio frequency identification | p. 353 |
The high-speed packet cipher system suitable for small sized data | p. 364 |
A tool for managing security policies in organisations | p. 378 |
Information flow query and verification for security policy of security-enhanced Linux | p. 389 |
The complexity of discretionary access control | p. 405 |
Traceroute based IP channel for sending hidden short messages | p. 421 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.