|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Patrick HorsterPublisher: Chapman and Hall Imprint: Chapman and Hall Edition: 1996 ed. Dimensions: Width: 15.50cm , Height: 1.90cm , Length: 23.50cm Weight: 1.420kg ISBN: 9780412797804ISBN 10: 0412797801 Pages: 318 Publication Date: 30 September 1996 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPLASMA platform for secure multimedia applications. High-level security issues in multimedia/hypertext systems. Approaches to security in healthcare multimedia systems. Security flows analysis of the ATM emulated LAN. Cryptoanalysis of a voting scheme. Using workflow to enhance security in federated. Anonymous mobility management for third generation mobile networks. Security concepts for the WWW. An integrated solution for secure communications over B-ISDN. Network security in a telemedicine system. On the application of image decomposition to image compression and encryption. A new approach for delegation using hierarchical delegation tokens. BEAST: a fast block cipher for arbitrary blocksizes. A WWW based certification infrastructure for secure open network transactions. Distributed registration and key distribution for online universities. Establishing a key hierarchy for conditional access without encryption. Cybermoney in the Internet: an overview over new payment systems in the Internet. A restrictive blind signature scheme with applications to electronic cash. Secure billing - incontestable charging. ISDN LAN access: remote access security and user profile management. Secure World Wide Web access to server groups. Access control system using dynamic handwriting features. Is there a need for new information security models? Attack modelling in open network. The intrusion detection system AID - architecture, and experiences in automated audit analysis. Defending Networks: the expert system components of SECURENET. Increasing firewall reliability by recording routes. Index of contributors. Keyword index.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |