Seems you have not registered as a member of brandeisuniversity.org!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Key Exchange
  • Language: en
  • Pages: 46

Key Exchange

THE STORY: The scene is a bicycle path in Central Park, where three young cyclists come together each weekend. Philip, an aspiring novelist, is having an affair with Lisa, a photographer, while Michael, a Madison Avenue copywriter, is newly married

Cryptology and Network Security
  • Language: en
  • Pages: 380

Cryptology and Network Security

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006. The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.

User Authentication Principles, Theory and Practice
  • Language: en
  • Pages: 228
Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols
  • Language: en
  • Pages: 1120

Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Managing Information Technology Resources in Organizations in the Next Millennium
  • Language: en
  • Pages: 1140

Managing Information Technology Resources in Organizations in the Next Millennium

  • Type: Book
  • -
  • Published: 1999-01-01
  • -
  • Publisher: IGI Global

Managing Information Technology Resources in Organizations in the Next Millennium contains more than 200 unique perspectives on numerous timely issues of managing information technology in organizations around the world. This book, featuring the latest research and applied IT practices, is a valuable source in support of teaching and research agendas.

Protocols for Authentication and Key Establishment
  • Language: en
  • Pages: 321

Protocols for Authentication and Key Establishment

This is the first comprehensive and integrated treatment of key establishment protocols. It is aimed mainly at researchers and security professionals, although it will also be suitable as a supplementary text for graduate students and advanced undergraduates.

Authenticated Group Diffie-Hellman Key Exchange
  • Language: en
  • Pages: 5

Authenticated Group Diffie-Hellman Key Exchange

  • Type: Book
  • -
  • Published: 2002
  • -
  • Publisher: Unknown

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Bluetooth Security
  • Language: en
  • Pages: 204

Bluetooth Security

  • Type: Book
  • -
  • Published: 2004-01-01
  • -
  • Publisher: Artech House

This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standardOCOs latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization."

Public Key Cryptography - PKC 2005
  • Language: en
  • Pages: 431

Public Key Cryptography - PKC 2005

This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2005, held in Les Diablerets, Switzerland in January 2005. The 28 revised full papers presented were carefully reviewed and selected from 126 submissions. The papers are organized in topical sections on cryptanalysis, key establishment, optimization, building blocks, RSA cryptography, multivariate asymmetric cryptography, signature schemes, and identity-based cryptography.

Advances in Cryptology - ASIACRYPT 2004
  • Language: en
  • Pages: 546

Advances in Cryptology - ASIACRYPT 2004

This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2004, held at Jeju Island, Korea in December 2004. The 35 revised full papers presented were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on block ciphers, public key encryption, number theory and applications, secure computation, hash functions, key management, identification, XL algorithms, digital signatures, public key cryptanalysis, symmetric key cryptanalysis, and cryptographic protocols.