Communications and multimedia security: proceedings of the IFIP TC6, TC11 and Austrian Computer Society joint working conference on Communications and Multimedia Security, 1995
Reinhard Posch, International Federation for Information Processing, Österreichische Computer Gesellschaft
Chapman & Hall on behalf of the International Federation for Information Processing, 1995 - 221 sider
This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertext documents to specialized cryptographic algorithms. It provides the interested reader with a spectrum of up-to-the-minute knowledge on the topics covered.
Hva folk mener - Skriv en omtale
Vi har ikke funnet noen omtaler på noen av de vanlige stedene.
1 Issues of attack in distributed systems a generic attack model
The puzzling science of information integrity
Covered trust values in distributed systems
12 andre deler vises ikke
Andre utgaver - Vis alle
access control access control lists algorithm Alice application attack Austria authentication authorization based on Lucas blind signature blind signature scheme cipher classification criteria communications networks computer networks concrete security concrete security problems conference cover story covert channel cryptography cryptosystem database federations Database Systems defined digital signature discrete logarithm discrete logarithm problem distributed document system distributed system document version ElGamal signature scheme encrypted entities example Federated Database Systems Figure hidden signature scheme Hill cipher Horster hypertext hypertext system implementation integrity policy interface IT-security Kerberos key distribution Layer Lucas functions message recovery Meta signature scheme Michels and Petersen mod q Multilevel Security multimedia conferencing Network Security node notary object object-oriented participant patient plaintext protocol public key scheme with appendix security policy security subjects semagram signature scheme based specific steganography Theorem transaction trust values validation server variants verified video communication visibility server weak blind signature