000 | 03901nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-04846-3 | ||
003 | DE-He213 | ||
005 | 20240730190700.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2009 gw | s |||| 0|eng d | ||
020 |
_a9783642048463 _9978-3-642-04846-3 |
||
024 | 7 |
_a10.1007/978-3-642-04846-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aAdvances in Information and Computer Security _h[electronic resource] : _b4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings / _cedited by Tsuyoshi Takagi, Masahiro Mambo. |
250 | _a1st ed. 2009. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2009. |
|
300 |
_aXII, 229 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v5824 |
|
505 | 0 | _aInvited Talk -- The Future of Cryptographic Algorithms -- Block Cipher -- Bit-Free Collision: Application to APOP Attack -- Impossible Boomerang Attack for Block Cipher Structures -- Improved Distinguishing Attacks on HC-256 -- Cryptographic Protocols -- A Generic Construction of Timed-Release Encryption with Pre-open Capability -- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Universal Designated Verifier Signatures with Threshold-Signers -- Reducing Complexity Assumptions for Oblivious Transfer -- Protection and Intrusion Detection -- Tamper-Tolerant Software: Modeling and Implementation -- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation -- Efficient Intrusion Detection Based on Static Analysis and Stack Walks -- Authentication -- Strongly Secure Authenticated Key Exchange without NAXOS' Approach -- ID-Based Group Password-Authenticated Key Exchange -- A Proposal of Efficient Remote Biometric Authentication Protocol. | |
520 | _aThis book constitutes the refereed proceedings of the 4th International Workshop on Security, IWSEC 2009, held in Toyama, Japan, in October 2009. The 13 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on block cipher, cryptographic protocols, contents protection and intrusion detection, as well as authentication. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer programming. _94169 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9143478 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9143479 |
650 | 2 | 4 |
_aProgramming Techniques. _9143480 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aTakagi, Tsuyoshi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9143481 |
|
700 | 1 |
_aMambo, Masahiro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9143482 |
|
710 | 2 |
_aSpringerLink (Online service) _9143483 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642048456 |
776 | 0 | 8 |
_iPrinted edition: _z9783642048470 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v5824 _9143484 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-04846-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93390 _d93390 |