default search action
Handbook of Information and Communication Security 2010
- Peter P. Stavroulakis, Mark Stamp:
Handbook of Information and Communication Security. Springer 2010, ISBN 978-3-642-04116-7
Fundamentals and Cryptography
- Clark D. Thomborson:
A Framework for System Security. 3-20 - Jonathan Katz:
Public-Key Cryptography. 21-34 - David Jao:
Elliptic Curve Cryptography. 35-57 - Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. 59-79 - Christopher Swenson:
Block Cipher Cryptanalysis. 81-89 - Jerzy Pejas, Adrian Skrobek:
Chaos-Based Information Security. 91-128 - Kai Xi, Jiankun Hu:
Bio-Cryptography. 129-157 - Christian Monyk:
Quantum Cryptography. 159-174
Intrusion Detection and Access Control
- Karen Scarfone, Peter Mell:
Intrusion Detection and Prevention Systems. 177-192 - Bazara I. A. Barry, H. Anthony Chan:
Intrusion Detection Systems. 193-205 - Inderjeet Pabla, Ibrahim Khalil, Jiankun Hu:
Intranet Security via Firewalls. 207-219 - Himanshu Singh, Robert Chun:
Distributed Port Scan Detection. 221-234 - Jiankun Hu:
Host-Based Anomaly Intrusion Detection. 235-255 - Neerja Bhatnagar:
Security in Relational Databases. 257-272 - Alessandro Basso, Francesco Bergadano:
Anti-bot Strategies Based on Human Interactive Proofs. 273-291 - Maurizio Colombo, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori:
Access and Usage Control in Grid Systems. 293-308 - Fahim K. Sufi, Ibrahim Khalil, Jiankun Hu:
ECG-Based Authentication. 309-331
Networking
- Ping Wang, Baber Aslam, Cliff Changchun Zou:
Peer-to-Peer Botnets. 335-350 - Theodosis Dimitrakos, David Brossard, Pierre de Leusse, Srijith K. Nair:
Security of Service Networks. 351-382 - Abdun Naser Mahmood, Christopher Leckie, Jiankun Hu, Zahir Tari, Mohammed Atiquzzaman:
Network Traffic Analysis and SCADA Security. 383-405 - Melody Moh, Ji Li:
Mobile Ad Hoc Network Routing. 407-420 - Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris:
Security for Ad Hoc Networks. 421-432 - Zulfikar Ramzan:
Phishing Attacks and Countermeasures. 433-448
Optical Networking
- Alexandre Locquet:
Chaos-Based Secure Optical Communications Using Semiconductor Lasers. 451-478 - Apostolos Argyris, Dimitris Syvridis:
Chaos Applications in Optical Communications. 479-510
Wireless Networking
- Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. 513-552 - Jamil Ibriq, Imad Mahgoub, Mohammad Ilyas:
Secure Routing in Wireless Sensor Networks. 553-578 - Chih-fan Hsin:
Security via Surveillance and Monitoring. 579-602 - Konstantinos Birkos, Theofilos Chrysikos, Stavros Kotsopoulos, Ioannis A. Maniatis:
Security and Quality of Service in Wireless Networks. 603-630
Software
- Úlfar Erlingsson, Yves Younan, Frank Piessens:
Low-Level Software Security by Example. 633-658 - Teodoro Cipresso, Mark Stamp:
Software Reverse Engineering. 659-696 - Antonio Lioy, Gianluca Ramunno:
Trusted Computing. 697-717 - Zheng Yan:
Security via Trusted Communications. 719-746 - Eric Filiol:
Viruses and Malware. 747-769 - Thomas H. Austin:
Designing a Secure Programming Language. 771-785
Forensics and Legal Issues
- Frederick B. Cohen:
Fundamentals of Digital Forensic Evidence. 789-808 - Shiguo Lian, Yan Zhang:
Multimedia Forensics for Detecting Forgeries. 809-828 - Peter P. Stavroulakis:
Technological and Legal Aspects of CIS. 829-850
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.