|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Reinhard PoschPublisher: Chapman and Hall Imprint: Chapman and Hall Edition: 1995 ed. Dimensions: Width: 15.60cm , Height: 1.40cm , Length: 23.40cm Weight: 1.130kg ISBN: 9780412732607ISBN 10: 0412732602 Pages: 224 Publication Date: 31 August 1995 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsIssues of attack in distributed systems - a generic attack model. The puzzling science of information integrity. Covered trust values in distributed systems. File server architecture for an open distributed document system. A heuristic for securing hypertext systems. Video communication - security and quality issues. The graphical interface for secure mail. The network security reference model: its security subjects and their classification criteria. A strategic approach to a national security policy. The patient card and its position in a `new health care system'. Access controls for federated database environments - taxonomy of design choices. Authorization in multimedia conferencing systems. Authentication and key distribution in computer networks and distributed systems. Hidden signature schemes based on the discrete logarithm problem and related concepts. Digital signature schemes based on Lucas functions. Power permutations on prime residue classes. Hillcipher application to Multimedia Security. From `Steganographia' to subliminal communication. On the fractal nature of the set of all binary sequences with almost perfect linear complexity profile. Index of contributors. Keyword index.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |