2010

Handbook of Information and Communication Security

Editors:

ISBN: 978-3-642-04116-7 (Print) 978-3-642-04117-4 (Online)

Table of contents (38 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xvi

  2. Fundamentals and Cryptography

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-20

      A Framework for System Security

    3. No Access

      Book Chapter

      Pages 21-34

      Public-Key Cryptography

    4. No Access

      Book Chapter

      Pages 35-57

      Elliptic Curve Cryptography

    5. No Access

      Book Chapter

      Pages 59-79

      Cryptographic Hash Functions

    6. No Access

      Book Chapter

      Pages 81-89

      Block Cipher Cryptanalysis

    7. No Access

      Book Chapter

      Pages 91-128

      Chaos-Based Information Security

    8. No Access

      Book Chapter

      Pages 129-157

      Bio-Cryptography

    9. No Access

      Book Chapter

      Pages 159-174

      Quantum Cryptography

  3. Intrusion Detection and Access Control

    1. Front Matter

      Pages 175-175

    2. No Access

      Book Chapter

      Pages 177-192

      Intrusion Detection and Prevention Systems

    3. No Access

      Book Chapter

      Pages 193-205

      Intrusion Detection Systems

    4. No Access

      Book Chapter

      Pages 207-219

      Intranet Security via Firewalls

    5. No Access

      Book Chapter

      Pages 221-234

      Distributed Port Scan Detection

    6. No Access

      Book Chapter

      Pages 235-255

      Host-Based Anomaly Intrusion Detection

    7. No Access

      Book Chapter

      Pages 257-272

      Security in Relational Databases

    8. No Access

      Book Chapter

      Pages 273-291

      Anti-bot Strategies Based on Human Interactive Proofs

    9. No Access

      Book Chapter

      Pages 293-308

      Access and Usage Control in Grid Systems

    10. No Access

      Book Chapter

      Pages 309-331

      ECG-Based Authentication

  4. Networking

    1. Front Matter

      Pages 333-333

    2. No Access

      Book Chapter

      Pages 335-350

      Peer-to-Peer Botnets

    3. No Access

      Book Chapter

      Pages 351-382

      Security of Service Networks

    4. No Access

      Book Chapter

      Pages 383-405

      Network Traffic Analysis and SCADA Security

previous Page of 2