Communications and Multimedia SecurityReinhard Posch Springer, 9. jan. 2016 - 224 sider This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertext documents to specialized cryptographic algorithms. It provides the interested reader with a spectrum of up-to-the-minute knowledge on the topics covered. |
Innhold
G J Simmons | 17 |
4 | 28 |
5 | 37 |
S Olivier | 43 |
7 | 64 |
8 | 80 |
9 | 104 |
The patient card and its position in a new health care system | 110 |
Authorization in multimedia conferencing systems | 133 |
Authentication and key distribution in computer networks and distributed | 148 |
Hidden signature schemes beased on the discrete logarithm problem | 160 |
Digital signature schemes based on Lucas functions | 178 |
Power permutations on prime residue classes | 191 |
From Steganographia to subliminal communications | 205 |
222 | |
Access controls for federated database environments taxonomy | 117 |
Andre utgaver - Vis alle
Vanlige uttrykk og setninger
access control access control lists algorithm application attack Austria authentication authorization based on Lucas blind signature blind signature scheme ciphertext classification criteria communications network computer networks concrete security concrete security problems conference cover story covert channel cryptography cryptosystem database federations Database Systems defined digital signature discrete logarithm distributed document system distributed system document version e-mail ElGamal signature scheme encrypted entities example Federated Database Systems Figure Hausdorff dimension hidden signature scheme Hill cipher Horster hypertext hypertext system implementation integrity policy interface IT-security Kerberos key distribution Layer Lucas functions Meta signature scheme Michels and Petersen mod q Multilevel Security multimedia conferencing node notary object object-oriented paper participant patient permutations plaintext protocol public key requirements scheme with appendix security policy security subjects semagram sequences signature scheme based steganography Theorem transaction trust values validation server verified video communication visibility server weak blind signature