Communications and Multimedia Security

Author:   Reinhard Posch
Publisher:   Chapman and Hall
Edition:   1995 ed.
ISBN:  

9780412732607


Pages:   224
Publication Date:   31 August 1995
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $440.95 Quantity:  
Add to Cart

Share |

Communications and Multimedia Security


Add your own review!

Overview

Full Product Details

Author:   Reinhard Posch
Publisher:   Chapman and Hall
Imprint:   Chapman and Hall
Edition:   1995 ed.
Dimensions:   Width: 15.60cm , Height: 1.40cm , Length: 23.40cm
Weight:   1.130kg
ISBN:  

9780412732607


ISBN 10:   0412732602
Pages:   224
Publication Date:   31 August 1995
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Issues of attack in distributed systems - a generic attack model. The puzzling science of information integrity. Covered trust values in distributed systems. File server architecture for an open distributed document system. A heuristic for securing hypertext systems. Video communication - security and quality issues. The graphical interface for secure mail. The network security reference model: its security subjects and their classification criteria. A strategic approach to a national security policy. The patient card and its position in a `new health care system'. Access controls for federated database environments - taxonomy of design choices. Authorization in multimedia conferencing systems. Authentication and key distribution in computer networks and distributed systems. Hidden signature schemes based on the discrete logarithm problem and related concepts. Digital signature schemes based on Lucas functions. Power permutations on prime residue classes. Hillcipher application to Multimedia Security. From `Steganographia' to subliminal communication. On the fractal nature of the set of all binary sequences with almost perfect linear complexity profile. Index of contributors. Keyword index.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List