Enhanced Methods In Computer Security, Biometric And Artificial Intelligence Systems

E-Book Overview

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

E-Book Content

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems Edited by Jerzy Peja6 Andrzej Piegat Technical University of Szczecin, Poland GI - Springer Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. Pejas, J. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems1 edited by Jerzy Pejas, Andrzej Piegat p.cin. ISBN 1-4020-7776-9 e-book 0-387-23484-5 Printed on acid-free paper. O 2005 Springer Science+Business Meda, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietaq rights. Printed in the United States of America 9 8 7 6 5 4 3 2 1 springeronline. corn SPIN 11053675 (HC) Table of Contents Preface ................................................................................................................. ix Chapter 1 Information Technology Security JANUSZ GORSKI How can we justify trust in software based systems? ........................................ 3 T O M S Z HEBISZ, E UGENIUSZ KURIA TA The capacity of ciphers fulfilling the accessibility of cryptograms...................13 V. BELETSKYI: D. BURAK Parallelization of the Data Encryption Standard (DES) algorithm ...................23 WITOLD MCKOW Linked authenticated dictionaries for certificate status verification..................35 IMED EL FRAI: JERZY PEJAS Integrated Payment System for Public Key Infrastructure Services .................47 JERZY PEJAS, IMED EL FRAY Some methods of the analysis and risk assessment in the PIU system services providers ..........................................................................................61 IGOR IMARGAS&SKI,KRZYSZTOF SZCZYPIORSKI VAST: Versatile Anonynous System for Web Users .....................................71 BARTOSZ SOKOL, V. N. YARMOLIK Cryptography and Steganography: teaching experience ..................................83 IMAREK JA CKIE WICZ, E UGENIUSZ KURIA TA Analysis of non-linear pseudo-noise sequences...........
You might also like

Distributed Computing: Principles, Algorithms, And Systems
Authors: Ajay D. Kshemkalyani , Mukesh Singhal    93    0


Algorithms And Complexity
Authors: Herbert S. Wilf    100    0


Shape Analysis And Structuring
Authors: Leila de Floriani , Michela Spagnuolo    104    0


Lectures On Image Processing
Authors: Morse B.S.    115    0



Introduction To Complexity Theory, Lecture Notes
Authors: Goldreich O.    105    0


A Practical Theory Of Programming
Authors: Eric C.R. Hehner    120    0


Encyclopedia Of Physical Science And Technology - Computer Software
Authors: Robert A. Meyers (Editor-in-Chief)    144    0


Combinatorial Optimization: Networks And Matroids
Authors: Lawler E.L.    125    0


System Theory, The Schur Algorithm And Multidimensional Analysis
Authors: Daniel Alpay , Victor Vinnikov    158    0