
Information Security and Assurance
Beschreibung
Weitere Details
Weitere Ausgaben
Inhalt
- Title
- Foreword
- Preface
- Organization
- Table of Contents
- Information Security Awareness Campaign: An Alternate Approach
- Introduction
- Related Work
- Research Design and Methodology
- Best Practices in a Health Awareness Campaign
- Best Practices in an Environmental Awareness Campaign
- A Comprehensive Information Security Awareness Model
- Conclusion
- References
- Equivalent Key Recovery Attack on H2-MAC Instantiated with MD5
- Introduction
- Preliminaries
- Notations
- Brief Description of MD5
- Pseudo-collisions of MD5
- Brief Description of H2-MAC
- Equivalent Key Recovery Attack on H2-MAC-MD5
- Distinguishing Attack on H2-MAC-MD5
- Recovering the Equivalent Key
- Selective Forgery Attack
- Conclusions
- References
- Recent Progress in Code-Based Cryptography
- Introduction
- Encryption
- Reducing the Key Size of the McEliece Cryptosystem
- Implementation on Different Platforms
- Identification
- Quasi-Cyclic Stern
- Cayrel et al.'s Identification Scheme
- Signature
- Quasi-Dyadic-CFS
- Parallel-CFS
- Barreto et al's OTS
- Secret Key Code-Based Cryptography
- FSB SHA-3 Proposal
- RFSB
- SYND Stream Cipher
- Cryptanalysis
- Structural Attacks
- Decoding Attacks
- Conclusion
- References
- GPU Implementation of the Keccak Hash Function Family
- Introduction
- The Keccak Hash Function Family
- Structure of Keccak
- Detailed View of Keccak
- Proposed Parameters
- GPU Implementation
- CUDA Programming Model
- Basic GPU Implementation of Keccak on the GPU
- Additional Keccak Modes on the GPU
- Experimental Results
- Conclusion and Further Work
- References
- A Comparative Study of a New Associative Classification Approach for Mining Rare and Frequent Classification Rules
- Introduction
- Basic Concepts of Associative Classification
- Related Work
- Breadth-First Search
- Depth-First Search
- Our Proposed Approach
- Conclusion
- References
- Secret Key Awareness Security Public Key Encryption Scheme
- Introduction
- Related Work
- Our Contributions
- Preliminaries
- Computational Complexity
- Certificateless Public Key Encryption
- Secret Key Awareness Security
- Definition
- Implementing Secret Key Awareness with Non-Black-Box Technology
- Two Applications
- A Construction for Encryption Scheme with Plaintext Awareness Security
- A Construction for Certificatless Encryption Scheme Secure in the Strong Model
- Conclusion
- References
- Using SAT Solving to Improve Differential Fault Analysis of Trivium
- Introduction
- Algebraic Description of Trivium
- Preliminaries on the DFA of Trivium
- Generating Low Degree Polynomial Equations
- Attack Description
- Experimental Results
- Conclusion
- References
- Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis
- Introduction
- State of the Art
- ISAC Language
- LLVM Compiler System
- Design of a Retargetable Decompiler
- Front-End
- Middle-End
- Back-End
- Experimental Results
- Conclusion
- References
- The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review
- Introduction
- Related Work and Motivation for the Proactive Investigation Process
- Planning the Systematic Literature Review (SLR)
- Specify Research Questions
- Develop Review Protocol
- Validate Review Protocol
- Conducting the Systematic Literature Review
- Identify Relevant Research Sources
- Select Primary Studies
- Assess Study Quality
- Extract Required Data
- Synthesize Data
- Documenting the Systematic Literature Review
- Write Review Report
- Validate Report
- Research Findings
- Conclusion
- References
- Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems
- Introduction
- Related Work
- Software Architecture
- Self-Organizing Map
- Clustering Algorithm
- Correlation Index
- Experimental Results
- Conclusion
- References
- 2SC: An Efficient Code-Based Stream Cipher
- Introduction
- Preliminaries
- Related Works
- Our Proposal: 2SC
- Security Analysis of 2SC
- Best Known Attacks
- Pseudorandomess
- Parameters and Implementation Results
- Conclusion and Future Work
- References
- Towards Algebraic Cryptanalysis of HFE Challenge 2
- Introduction
- Notation
- HFE Cryptosystem
- `3´9`42`"?613A``45`47`"603AMXL3 Algorithm
- Attack Description
- Experimental Results
- References
- S-FSB: An Improved Variant of the FSB Hash Family
- Introduction
- Preliminaries
- Related Works
- Our Construction: S-FSB
- Description of S-FSB
- Security Analysis
- Theoretical Security
- Practical Security
- Proposed Parameters
- Performance Evaluation
- References
- Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes
- Introduction
- Background of Coding Theory
- Quasi-Dyadic Codes
- Usual Attacks
- Identity-Based Identification and Signature Scheme
- Description of CFS Signature Scheme
- Description of the Stern Identification Scheme
- Identity Based Identification (IBI) Protocol
- Identity-Based Identification Using Quasi-Dyadic Codes
- Quasi-Dyadic Codes for CFS Signature
- Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes (QD-IBI)
- Conclusion
- References
- A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1
- Introduction
- Prime Series
- The Structure of Composite Numbers in R5
- The Structure of Absolute Positions for R5 Composite Numbers
- A Factorization and Primality Testing Algorithm
- Algorithm Performance
- Conclusion
- References
- Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme
- Introduction
- Background
- The Finite Field Fp
- Elliptic Curve over Fp
- Elliptic Curve Discrete Logarithm Problem (ECDLP)
- Elliptic Curve Digital Signature Algorithm
- ECDSA Signature Generation and Verification
- Preliminaries
- Notations
- Relatated Works
- Model of Deniable Authentication Protocol
- Security Model
- Proposed Protocol
- Correctness
- Security Analysis
- Conclusion
- References
- Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm
- Introduction
- A Brief Overview of Elliptic Curve Theory
- The Complex Multiplication Method
- Cardinalities of Elliptic Curve Classes with Order of a Specific Form
- Randomly Generated Elliptic Curves
- Interpolation of the Square Root of the Discrete Logarithm for Elliptic Curves of Orders of Different Types
- References
- Towards Next Generation System Architecture for Emergency Services
- Introduction
- Emergency Legislation and 112 Emergency Number in Europe
- Emergency Service Provision in Europe
- The Status of the 112 and E112 Service in Europe
- Current Warning and Alerting Systems in Europe
- New Emergency Call/Reporting Systems
- eCall System in Europe
- Social Media in Emergency Reporting and Management
- New Alerting and Service Provisioning Systems
- Alerting Population through Cell Broadcast (CB) and Multimedia Broadcast and Multicast Service (MBMS) in Mobile Networks
- Alerting Population Based on Location Information
- Vehicle-to-vehicle Alert Systems
- Other System Proposals and Deployed Systems
- Conclusions
- References
- Securing Communication between SCADA Master Station and Mobile Remote Components
- Introduction
- Supervisory Control and Data Acquisition (SCADA)
- Internet SCADA Technology
- Remote Mobile Components
- Symmetric Key Encryption
- Conclusion
- References
- Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System
- Introduction
- The SCADA Infrastructure Process
- SCADA over the Internet
- The Problem
- Known Attacks
- The Scheme for CAIN Threats
- Integration of Cryptography
- Implementation
- Testing the Scheme
- Conclusion
- References
- Application Program Interface as Back-Up Data Source for SCADA Systems
- Introduction
- Supervisory Control and Data Acquisition (SCADA)
- Internet SCADA Technology
- API
- Integrating API to SCADA
- Conclusion
- References
- Supervisory Control and Data Acquisition System CAIN Issues
- Introduction
- The SCADA Infrastructure Process
- Monolithic: First Generation
- Distributed: Second Generation
- Networked: Third Generation
- The Problem
- Known Attacks
- The Scheme for CAIN Threats
- Integration of Cryptography
- Implementation
- Testing the Scheme
- Conclusion
- References
- RFID Implementation and Security Issues
- Introduction
- History
- How It Works
- Current Usages
- Potential Usages and Benefits
- Implementation Issues of RFID
- E-passports
- Human Implantation
- Religious Objection
- Cancer Risk
- Privacy
- Standardization
- Tag Standards
- Shipping Standards
- RFID Threats
- Unauthorized Reads
- Cloning
- Viruses and Malware
- Kill Command
- RFID Security Measures
- Software Based Security
- Encryption
- Signal Jamming and Blocking
- Authentication and Challenge Response
- Conclusion
- References
- Vehicle Tracking Based on Kalman Filter in Tunnel
- Introduction
- Proposed Algorithm
- Vehicle Detection Algorithm: Adaboost
- Vehicles Tracking Algorithm
- Experimental Results
- Conclusions
- References
- The Contents Based Music Retrieval Method Using Audio Feature Analysis against Polyphonic Music
- Introduction
- Pitch Estimation Algorithm
- Melody Extraction
- Fusion Method Matching Engine
- Experiments
- References
- A Noise Robust Echo Canceller with Post-processing Using Liner Predictor and Wiener filter
- Introduction
- Proposed Echo Canceller
- Adaptive Echo Path Estimation Algorithm
- Double-Talk Detector
- Linear Prediction Error Filter
- Wiener Filter
- Computer Simulation and Results
- Steady-State Echo Gain
- AIC (Acoustic Interference Cancellation) in Acoustic Echo Canceller
- Conclusions
- References
- Implementation Fire Detection Algorithm Using Fixed Point Digital Signal Processor
- Introduction
- Fire Detection Algorithm and Smart Video Processing Board
- Smoke and Flame Detection Algorithm
- Smart Video Processing Board
- Experimental Results
- Conclusions
- References
- An Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform
- Introduction
- Related Work
- FIPA Agent Platform
- Web Service Architecture
- DHT
- System Architecture
- Service Matchmaker
- Implementation
- Performance Evaluation
- Conclusion and Future Work
- References
- A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications
- Introduction
- Paper Preparation
- Figures
- Overview of Our Scheme
- Transformation Process
- Inverse Transformation Process
- Example
- Comparison with Related Works
- Anti-Tamper Open-Form Encryption[8]
- Order-Preserving Encryption(OPES)[1]
- Bucketization[6]
- B+-Trees Index[2][3]
- Hash Based Index[2][3]
- Analysis and Experiment
- Example for Range Query
- Experiment
- Conclusions
- References
- Improvement of Message Processing Method for SOA Based Digital Set-Top Box System
- Introduction
- Related Research
- DVB(Digital Video Broadcasting)
- MPEG-2(Moving Picture Expert Group)
- SOA(Service Oriented Architectures)
- Design and Implementation
- System Architecture
- System Message
- System Message Manager
- Results
- References
- A Data Management Method to Secure Data in Cloud Computing Environment
- Introduction
- Main Body
- AONT Method
- AONT Method
- Proposed Method
- Overview of Proposed Method
- Scenario Configuration
- Experiment and Analysis
- Conclusions
- References
- VLSI Architecture of Adaptive Viterbi Decoder for Wireless Communication
- Introduction
- Adaptive Viterbi Decoder Architecture
- BMC and ACS Block
- Systolic Structure
- Specification Variation Range and Overhead
- Viterbi Decoder Specification Decision
- Viterbi Spec. Satisfying Target BER vs. Channel Eb/N0 Simulation
- Energy Consumption Simulation
- Viterbi Decoder Parameter Decision
- Adaptive Viterbi Decoder Energy Simulation
- Simulation Method
- Simulation Result
- Conclusion
- References
- A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment
- Introduction
- Discussion on the Privacy
- Concept of Privacy
- New Understanding Privacy under Mobile Environment
- The Right to Be Forgotten
- The Concept of "The Right to Be Forgotten"
- Social Network Service and "The Right to Be Forgotten"
- Security Scheme
- Conclusions
- References
- Development of Integrated Adapter Based on Multi-sensor Networks for Tracking and Surveillance
- Introduction
- Related Work
- Development of Integrated Adaptor
- Conclusion
- References
- High Speed and Low-Complexity Mode Decision for Advanced Video Coding
- Introduction
- Low-Complexity Motion Estimation
- Motion Estimation in the JM Encoder
- Human Visual System
- ROI-Based Video Coding
- Speed-Dependent Motion Estimation
- New Fast SDME Algorithm
- Experimental Results
- Conclusions
- References
- Robust Congestion Control Design for Input Time Delayed AQM System
- Introduction
- AQM System
- Linear Model of AQM
- State-Space Model of AQM
- Robust Control of AQM
- Augemented State-Space Model
- LQ-Servo Control
- LQ-Servo Control with Input Time Delay
- Selection of the Weighting Factors
- Loop-Shaping Method
- Design Specifications
- Selection of Weighting Factor
- Simulations
- Conclusion
- References
- An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color Histogram
- Introduction
- Related Work
- Temporal and Color-Based Clustering
- Experiment
- Conclusion
- References
- Requirements Analysis and Critical Requirement Derivation Method Using Macrostruktur
- Introduction
- Related Work
- Macrostruktur of Van Dijk
- Characteristics and Principles of Macro-rules
- Requirements Analysis Method Using Macrostrukur Concept
- Requirement Analysis Using Macrostruktur
- Definition of Critical Requirements Using Macrostruktur
- Case Study
- Application of Semantic Propositions Using Macrostruktur
- Derivation of Macro-Proposition Using Macro-Rules
- Conclusion
- References
- A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)
- Introduction
- 3D CCTV
- Computer-Enhanced CCTV
- 3D CCTV Based on Web and Smart-Phone
- Role-Based 3D CCTV
- CS-RBAC
- Role-Based 3D CCTV Using CS-RBAC
- Scheme for 3D CCTV Using CS-RBAC
- Conclusions
- References
- Vessel Tracking Using Adaboost Algorithm and AIS Information
- Introduction
- Vessel Detection and Tracking
- Matching with AIS Information
- Vessel Detection Algorithm
- Experimental Results
- Conclusions
- References
- Relative Self-Localization Base on Fish-Eye Lenses and SIFT Algorithm for Indoor Mobile Robot
- Introduction
- Feature Point Extraction and Matching
- Radial Lens Distortions and Its Correction
- Removal of Non-ceiling Key Point
- Simulation Result
- Conclusions
- References
- User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone*
- Introduction
- One-Time Password on Smart Phone
- Existing One-Time Password Mechanisms
- Image Based User Authentication
- Pseudo Biometric One-Time Password Mechanism
- Proposed Pseudo Biometric Image Based OTP Mechanism
- Using Pseudo Biometric Image on OTP Generation
- Pseudo Biometric OTP Generation on Client
- Pseudo Biometric OTP Verification on Server
- Implementation and Security Analysis
- Implementation Results
- Security Analysis
- Conclusions
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.