Computer Network Security Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gorodetsky, Vladimir (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Popyack, Leonard (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Skormin, Victor (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2776
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Papers
  • ForNet: A Distributed Forensics Network
  • Usage Control: A Vision for Next Generation Access Control
  • Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL
  • Complexity Problems in the Analysis of Information Systems Security
  • A Behavior-Based Approach to Securing Email Systems
  • Real-Time Intrusion Detection with Emphasis on Insider Attacks
  • Mathematical Models and Architectures for Computer Network Security
  • Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols
  • GRID Security Review
  • A Knowledge-Based Repository Model for Security Policies Management
  • Symbolic Partial Model Checking for Security Analysis
  • Rule-Based Systems Security Model
  • Logical Resolving for Security Evaluation
  • Intrusion Detection
  • Enhanced Correlation in an Intrusion Detection Process
  • Safeguarding SCADA Systems with Anomaly Detection
  • Experiments with Simulation of Attacks against Computer Networks
  • Detecting Malicious Codes by the Presence of Their "Gene of Self-replication"
  • Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences
  • Public Key Distribution, Authentication, Access Control
  • Distributed Access Control: A Logic-Based Approach
  • Advanced Certificate Status Protocol
  • Key History Tree: Efficient Group Key Management with Off-Line Members
  • A Certificate Status Checking Protocol for the Authenticated Dictionary
  • Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach
  • Cryptography
  • A Signcryption Scheme Based on Secret Sharing Technique
  • A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem
  • Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property
  • Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper
  • On Cipher Design Based on Switchable Controlled Operations
  • Elliptic Curve Point Multiplication
  • Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation
  • Steganography
  • Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel
  • Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation
  • Digital Watermarking under a Filtering and Additive Noise Attack Condition
  • Data Hiding in Digital Audio by Frequency Domain Dithering
  • Steganography with Least Histogram Abnormality
  • Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences
  • Short Papers
  • Authentication of Anycast Communication
  • Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy
  • Construction of the Covert Channels
  • Privacy and Data Protection in Electronic Communications
  • Multiplier for Public-Key Cryptosystem Based on Cellular Automata
  • A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols
  • Alert Triage on the ROC
  • Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64
  • Immunocomputing Model of Intrusion Detection
  • Agent Platform Security Architecture
  • Support Vector Machine Based ICMP Covert Channel Attack Detection
  • Computer Immunology System with Variable Configuration.