000 | 04880nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-12827-1 | ||
003 | DE-He213 | ||
005 | 20240730185047.0 | ||
007 | cr nn 008mamaa | ||
008 | 100509s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642128271 _9978-3-642-12827-1 |
||
024 | 7 |
_a10.1007/978-3-642-12827-1 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aInformation Security, Practice and Experience _h[electronic resource] : _b6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings / _cedited by Jin Kwak, Robert H. Deng, Guilin Wang, Yoojae Won. |
250 | _a1st ed. 2010. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2010. |
|
300 |
_aXIII, 399 p. 68 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6047 |
|
505 | 0 | _aCryptanalysis -- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 -- Integral Attacks on Reduced-Round ARIA Block Cipher -- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance -- On the Security of NOEKEON against Side Channel Cube Attacks -- Algorithms and Implementations (I) -- On Fast and Approximate Attack Tree Computations -- Width-3 Joint Sparse Form -- Accelerating Inverse of GF(2 n ) with Precomputation -- Algorithms and Implementations (II) -- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis -- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups -- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables -- Network Security -- Host-Based Security Sensor Integrity in Multiprocessing Environments -- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating -- Rate-Based Watermark Traceback: A New Approach -- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes -- Access Control -- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk -- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), -- Identity Management -- A Trustworthy ID Management Mechanism in Open Market -- BioID: Biometric-Based Identity Management -- Trust Management -- Privacy Preserving of Trust Management Credentials Based on Trusted Computing -- Mitigating the Malicious Trust Expansion in Social Network Service -- Public Key Cryptography -- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification -- Certificateless KEM and Hybrid Signcryption Schemes Revisited -- A Deniable Group Key Establishment Protocol in the Standard Model -- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting -- Security Applications -- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis -- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles -- Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards -- Protection Profile for Secure E-Voting Systems. | |
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9137745 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9137746 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aKwak, Jin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137747 |
|
700 | 1 |
_aDeng, Robert H. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137748 |
|
700 | 1 |
_aWang, Guilin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137749 |
|
700 | 1 |
_aWon, Yoojae. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137750 |
|
710 | 2 |
_aSpringerLink (Online service) _9137751 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642128264 |
776 | 0 | 8 |
_iPrinted edition: _z9783642128288 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6047 _9137752 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-12827-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92624 _d92624 |