In the second contribution, entitled "Behavioral Characterization for Network Anomaly Detection," Victor P. Roche and Unai Arronategui propose a methodology for detecting abnormal traffic on the net, such as worm attacks, based on the obser- tion of the behavior of different elements at the network edges. This methodology means an advance in the detection of a new infection in the backbone of the network, but also in the identification of the infected hosts of a specific network. The authors try to detect network anomalies by tracking the behavior of different network levels. This proposed method is not based on intrinsic characteristics of the worm but on their manner of acting. This methodology has proved its effectiveness in real infections caused by viruses such as SpyBot and Agobot in accordance with experimental tests. In the third contribution, which is entitled "The Power of Anonymous Veto in Public Discussion," Feng Hao and Piotr Zielinski propose an exceptional solution--Anonymous Veto Network (or AV-net)--to allow a group of participants to compute a boolean-OR function securely. This protocol is provably secure under the Decision Diffie-Hellman (DDH) and random oracle assumptions.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9783642010033_new
Quantité disponible : Plus de 20 disponibles
Vendeur : Chiron Media, Wallingford, Royaume-Uni
Paperback. Etat : New. N° de réf. du vendeur 6666-IUK-9783642010033
Quantité disponible : 10 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14extensive papers selected for inclusion in this volumegive an in-depth coverageof a number of hot topics in the field,presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications. 284 pp. Englisch. N° de réf. du vendeur 9783642010033
Quantité disponible : 2 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. pp. 284. N° de réf. du vendeur 263051841
Quantité disponible : 4 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand pp. 284 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. N° de réf. du vendeur 5844638
Quantité disponible : 4 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 1st edition. 263 pages. 9.21x6.06x0.63 inches. In Stock. N° de réf. du vendeur x-3642010032
Quantité disponible : 2 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND pp. 284. N° de réf. du vendeur 183051851
Quantité disponible : 4 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines.- Behavioural Characterization for Network Anomaly Detection.- The Power of Anonymous Veto in Public Discussion.- Collusion-Resistant Message Authentication in Overla. N° de réf. du vendeur 5043255
Quantité disponible : Plus de 20 disponibles
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines.- Behavioural Characterization for Network Anomaly Detection.- The Power of Anonymous Veto in Public Discussion.- Collusion-Resistant Message Authentication in Overlay Multicast Communication.- A Model for Authentication Credentials Translation in Service Oriented Architecture.- Secure and Efficient Group Key Agreements for Cluster Based Networks.- An Integrated ECC-MAC Based on RS Code.- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks.- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools.- Role Based Access Control with Spatiotemporal Context for Mobile Applications.- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior.- A Hardware Architecture for Integrated-Security Services.- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology.- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 284 pp. Englisch. N° de réf. du vendeur 9783642010033
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14extensive papers selected for inclusion in this volumegive an in-depth coverageof a number of hot topics in the field,presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications. N° de réf. du vendeur 9783642010033
Quantité disponible : 1 disponible(s)