HOME > 상세정보

상세정보

Computer network security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003

Computer network security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003

자료유형
단행본
개인저자
Gorodetski, Vladimir I., 1937-. Popyack, Leonard J., 1963-. Skormin, Victor A., 1946-.
서명 / 저자사항
Computer network security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : proceedings / Vladimir Gorodetsky, Leonard Popyack, Victor Skormin eds.
발행사항
Berlin ;   New York :   Springer,   c2003.  
형태사항
xiv, 470 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2776
ISBN
3540407979 (pbk. : alk. paper) 9783540407973 (pbk. : alk. paper)
일반주제명
Computer security -- Congresses. Computer networks -- Security measures -- Congresses.
000 02052camuu2200409 a 4500
001 000045562121
005 20091127142747
008 030804s2003 gw a b 101 0 eng
010 ▼a 2003058583
020 ▼a 3540407979 (pbk. : alk. paper)
020 ▼a 9783540407973 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm52858526
035 ▼a (OCoLC)52858526
035 ▼a (KERIS)REF000009604154
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I565 2003
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I6192c ▼c 2
111 2 ▼a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security ▼n (2nd : ▼d 2003 : ▼c Saint Petersburg, Russia)
245 1 0 ▼a Computer network security : ▼b Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : proceedings / ▼c Vladimir Gorodetsky, Leonard Popyack, Victor Skormin eds.
246 3 ▼a 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
246 3 0 ▼a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
246 3 0 ▼a Mathematical Methods, Models, and Architectures for Computer Network Security
246 3 0 ▼a MMM-ACNS 2003
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2003.
300 ▼a xiv, 470 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2776
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computer networks ▼x Security measures ▼v Congresses.
700 1 ▼a Gorodetski, Vladimir I., ▼d 1937-.
700 1 ▼a Popyack, Leonard J., ▼d 1963-.
700 1 ▼a Skormin, Victor A., ▼d 1946-.
830 0 ▼a Lecture notes in computer science ; ▼v 2776.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I6192c 2 등록번호 121187016 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I6192c 2 등록번호 121187017 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Invited Papers.- ForNet: A Distributed Forensics Network.- Usage Control: A Vision for Next Generation Access Control.- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.- Complexity Problems in the Analysis of Information Systems Security.- A Behavior-Based Approach to Securing Email Systems.- Real-Time Intrusion Detection with Emphasis on Insider Attacks.- Mathematical Models and Architectures for Computer Network Security.- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.- GRID Security Review.- A Knowledge-Based Repository Model for Security Policies Management.- Symbolic Partial Model Checking for Security Analysis.- Rule-Based Systems Security Model.- Logical Resolving for Security Evaluation.- Intrusion Detection.- Enhanced Correlation in an Intrusion Detection Process.- Safeguarding SCADA Systems with Anomaly Detection.- Experiments with Simulation of Attacks against Computer Networks.- Detecting Malicious Codes by the Presence of Their "Gene of Self-replication".- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences.- Public Key Distribution, Authentication, Access Control.- Distributed Access Control: A Logic-Based Approach.- Advanced Certificate Status Protocol.- Key History Tree: Efficient Group Key Management with Off-Line Members.- A Certificate Status Checking Protocol for the Authenticated Dictionary.- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach.- Cryptography.- A Signcryption Scheme Based on Secret Sharing Technique.- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem.- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.- Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper.- On Cipher Design Based on Switchable Controlled Operations.- Elliptic Curve Point Multiplication.- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.- Steganography.- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel.- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.- Digital Watermarking under a Filtering and Additive Noise Attack Condition.- Data Hiding in Digital Audio by Frequency Domain Dithering.- Steganography with Least Histogram Abnormality.- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.- Short Papers.- Authentication of Anycast Communication.- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.- Construction of the Covert Channels.- Privacy and Data Protection in Electronic Communications.- Multiplier for Public-Key Cryptosystem Based on Cellular Automata.- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols.- Alert Triage on the ROC.- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64.- Immunocomputing Model of Intrusion Detection.- Agent Platform Security Architecture.- Support Vector Machine Based ICMP Covert Channel Attack Detection.- Computer Immunology System with Variable Configuration.


정보제공 : Aladin

관련분야 신착자료

이창현 (2021)