000 05215nam a22006375i 4500
001 978-3-540-34642-5
003 DE-He213
005 20240730192601.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 _a9783540346425
_9978-3-540-34642-5
024 7 _a10.1007/11766155
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aEmerging Trends in Information and Communication Security
_h[electronic resource] :
_bInternational Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings /
_cedited by Günter Müller.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXX, 532 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v3995
505 0 _aMultilateral Security -- Multilateral Security: Enabling Technologies and Their Evaluation -- Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems -- Security in Service-Oriented Computing -- Optimized Workflow Authorization in Service Oriented Architectures -- Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment -- A P2P Content Authentication Protocol Based on Byzantine Agreement -- Secure Mobile Applications -- Transitive Trust in Mobile Scenarios -- An Open, PKI-Based Mobile Payment System -- Secure Rejoining Scheme for Dynamic Sensor Networks -- Developing Provable Secure M-Commerce Applications -- Enterprise Privacy -- An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction -- Privacy-Preserving Decision Tree Mining Based on Random Substitutions -- Privacy, Identity, and Anonymity -- Policy-Based Integration of User and Provider-Sided Identity Management -- Privacy with Delegation of Rights by Identity Management -- A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System -- Revocable Anonymity -- Low Latency Anonymous Communication - How Long Are Users Willing to Wait? -- Security Engineering -- Security Engineering Using Problem Frames -- SecTOOL - Supporting Requirements Engineering for Access Control -- Possibilistic Information Flow Control in MAKS and Action Refinement -- Toward a Framework for Forensic Analysis of Scanning Worms -- A Comparison of Market Approaches to Software Vulnerability Disclosure -- Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples -- Security Policies -- Allowing State Changes in Specifications -- Field Access Analysis for Enforcing Access Control Policies -- Controlling Access toDocuments: A Formal Access Control Model -- How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security -- Security and Protocols -- Secure End-to-End Transport over SCTP -- An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information -- Filtering for Private Collaborative Benchmarking -- Intrusion Detection -- On the Use of Word Networks to Mimicry Attack Detection -- Simplifying Signature Engineering by Reuse -- Redesign and Implementation of Evaluation Dataset for Intrusion Detection System -- Requirements of Information Reductions for Cooperating Intrusion Detection Agents -- Perspectives of Cryptographic Security -- Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age -- Kleptographic Attacks on E-Voting Schemes -- Visual Document Authentication Using Human-Recognizable Watermarks.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aOperating systems (Computers).
_95329
650 0 _aApplication software.
_9150555
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9150556
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9150557
650 2 4 _aOperating Systems.
_937074
650 2 4 _aComputer and Information Systems Applications.
_9150558
650 2 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
700 1 _aMüller, Günter.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9150559
710 2 _aSpringerLink (Online service)
_9150560
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540346401
776 0 8 _iPrinted edition:
_z9783540824886
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v3995
_9150561
856 4 0 _uhttps://doi.org/10.1007/11766155
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c94331
_d94331