Information and Communications Security (Record no. 94690)

000 -LEADER
fixed length control field 06522nam a22006735i 4500
001 - CONTROL NUMBER
control field 978-3-642-34129-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730193310.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121026s2012 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642341298
-- 978-3-642-34129-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-34129-8
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Edition number 23
245 10 - TITLE STATEMENT
Title Information and Communications Security
Medium [electronic resource] :
Remainder of title 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings /
Statement of responsibility, etc. edited by Tat Wing Chim, Tsz Hon Yuen.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2012.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2012.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 506 p. 120 illus.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 7618
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Audio Steganalysis Based on Lossless Data-Compression Techniques -- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme -- Impact of the Revocation Service in PKI Prices -- Cryptanalysis of Multi-Prime RSA with Small Prime Difference -- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem -- Improved Related-Key Differential Attacks on Reduced-Round LBlock -- Countermeasures on Application Level Low-Rate Denial-of-Service Attack -- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test -- Group Behavior Metrics for P2P Botnet Detection -- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA -- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model -- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain -- Perfect Ambiguous Optimistic Fair Exchange -- Privacy-Preserving Noisy Keyword Search in Cloud Computing -- Forward Secure Attribute-Based Signatures -- On Constant-Round Precise Zero-Knowledge -- Outsourcing Encryption of Attribute-Based Encryption with MapReduce -- Security Enhancement of Identity-Based Identification with Reversibility -- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture -- Permission-Based Abnormal Application Detection for Android -- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic Approach for Providing Revocation Support in Secret Handshake -- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy -- Exploring Mobile Proxies for Better Password Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack -- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack -- Comparison between Side-Channel Analysis Distinguishers -- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware -- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme -- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition -- Cookie-Proxy: A Scheme to Prevent SSLStrip Attack -- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer -- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding -- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance -- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains -- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography -- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances -- Location Privacy Policy Management System.-Privacy Protection in Social Networks Using l-Diversity -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault Scheme -- A New Version of McEliece PKC Based on Convolutional Codes -- Flexible Attribute-Based Encryption -- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles -- A Comparative Study of Malware Family Classification -- A Fine-Grained Classification Approach for the Packed Malicious Code.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 1973
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 9168
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data structures (Computer science).
9 (RLIN) 8188
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information theory.
9 (RLIN) 14256
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Coding theory.
9 (RLIN) 4154
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Algorithms.
9 (RLIN) 3390
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks .
9 (RLIN) 31572
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptology.
9 (RLIN) 31769
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data Structures and Information Theory.
9 (RLIN) 31923
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Coding and Information Theory.
9 (RLIN) 153187
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Algorithms.
9 (RLIN) 3390
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Communication Networks.
9 (RLIN) 153188
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chim, Tat Wing.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 153189
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yuen, Tsz Hon.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 153190
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 153191
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783642341281
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783642341304
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 7618
9 (RLIN) 153192
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-642-34129-8">https://doi.org/10.1007/978-3-642-34129-8</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.