Computer Network Security Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
Έκδοση: | 1st ed. 2003. |
Σειρά: | Lecture Notes in Computer Science,
2776 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Papers
- ForNet: A Distributed Forensics Network
- Usage Control: A Vision for Next Generation Access Control
- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL
- Complexity Problems in the Analysis of Information Systems Security
- A Behavior-Based Approach to Securing Email Systems
- Real-Time Intrusion Detection with Emphasis on Insider Attacks
- Mathematical Models and Architectures for Computer Network Security
- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols
- GRID Security Review
- A Knowledge-Based Repository Model for Security Policies Management
- Symbolic Partial Model Checking for Security Analysis
- Rule-Based Systems Security Model
- Logical Resolving for Security Evaluation
- Intrusion Detection
- Enhanced Correlation in an Intrusion Detection Process
- Safeguarding SCADA Systems with Anomaly Detection
- Experiments with Simulation of Attacks against Computer Networks
- Detecting Malicious Codes by the Presence of Their "Gene of Self-replication"
- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences
- Public Key Distribution, Authentication, Access Control
- Distributed Access Control: A Logic-Based Approach
- Advanced Certificate Status Protocol
- Key History Tree: Efficient Group Key Management with Off-Line Members
- A Certificate Status Checking Protocol for the Authenticated Dictionary
- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach
- Cryptography
- A Signcryption Scheme Based on Secret Sharing Technique
- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem
- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property
- Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper
- On Cipher Design Based on Switchable Controlled Operations
- Elliptic Curve Point Multiplication
- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation
- Steganography
- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel
- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation
- Digital Watermarking under a Filtering and Additive Noise Attack Condition
- Data Hiding in Digital Audio by Frequency Domain Dithering
- Steganography with Least Histogram Abnormality
- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences
- Short Papers
- Authentication of Anycast Communication
- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy
- Construction of the Covert Channels
- Privacy and Data Protection in Electronic Communications
- Multiplier for Public-Key Cryptosystem Based on Cellular Automata
- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols
- Alert Triage on the ROC
- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64
- Immunocomputing Model of Intrusion Detection
- Agent Platform Security Architecture
- Support Vector Machine Based ICMP Covert Channel Attack Detection
- Computer Immunology System with Variable Configuration.