Publication year: 2007
ISBN: 978-3-540-76969-9
Internet Resource: Please Login to download book
This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.
Subject: Computer Science, DoS attacks, Information, Oracle, algorithms, anonymity, authentication, cryptographic protocols, encryption, micropayments, modeling, networks, peer-to-peer, privacy, provable security, security