2005

Computer Security in the 21st Century

Editors:

ISBN: 978-0-387-24005-3 (Print) 978-0-387-24006-0 (Online)

Table of contents (14 chapters)

  1. No Access

    Book Chapter

    Pages 1-3

    Introduction

  2. Security Protocol Design

    1. No Access

      Book Chapter

      Pages 7-24

      Challenges in Protocol Design and Analysis

    2. No Access

      Book Chapter

      Pages 25-50

      Private Matching

    3. No Access

      Book Chapter

      Pages 51-60

      Authentication Protocol Analysis

    4. No Access

      Book Chapter

      Pages 61-67

      Self-Certified Approach for Authenticated Key Agreement

  3. P2P and Ad Hoc Networks

    1. No Access

      Book Chapter

      Pages 71-89

      Experimenting with Admission Control in P2P Networks

    2. No Access

      Book Chapter

      Pages 91-105

      Adaptive Random Key Distribution Schemes for Wireless Sensor Networks

  4. Intrusion Detection, Defense, Measurement

    1. No Access

      Book Chapter

      Pages 109-137

      Measuring Relative Attack Surfaces

    2. No Access

      Book Chapter

      Pages 139-145

      A Modeling of Intrusion Detection Systems with Identification Capability

    3. No Access

      Book Chapter

      Pages 147-168

      A Source-End Defense System Against DDoS Attacks

    4. No Access

      Book Chapter

      Pages 169-180

      Beagle: Tracking System Failures for Reproducing Security Faults

  5. Multimedia Security

    1. No Access

      Book Chapter

      Pages 183-227

      Web Application Security—Past, Present, and Future

    2. No Access

      Book Chapter

      Pages 229-253

      Securing JPEG2000 Code-Streams

    3. No Access

      Book Chapter

      Pages 255-263

      A Secret Information Hiding Scheme Based on Switching Tree Coding