01758nam 2200385 a 450 991069331680332120050816080438.0(CKB)5470000002362270(OCoLC)61269655(EXLCZ)99547000000236227020050816d2005 ua 0engurmn|---|||||txtrdacontentcrdamediacrrdacarrierOverseas security[electronic resource] State Department has not fully implemented key measures to protect U.S. officials from terrorist attacks outside of embassies : testimony before the Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives /statement of Jess T. Ford[Washington, D.C.] :U.S. Government Accountability Office,[2005]Testimony ;GAO-05-688 TTitle from title screen (viewed on Aug. 11, 2005)."For release ... May 10, 2005."Paper version available from: U.S. Government Accountability Office, 441 G St., NW, Rm. LM, Washington, D.C. 20548.Includes bibliographical references.Overseas security TerrorismPreventionEvaluationTerrorismPreventionEvaluation.Ford Jess T1380997United States.Congress.House.Committee on Government Reform.Subcommittee on National Security, Emerging Threats, and International Relations.United States.Government Accountability Office.GPOGPOBOOK9910693316803321Overseas security3423380UNINA05464nam 22008655 450 991048306530332120251226195136.01-280-38536-797866135632863-642-10838-510.1007/978-3-642-10838-9(CKB)1000000000812684(SSID)ssj0000355526(PQKBManifestationID)11266149(PQKBTitleCode)TC0000355526(PQKBWorkID)10340897(PQKB)11367151(DE-He213)978-3-642-10838-9(MiAaPQ)EBC3064943(PPN)149042728(EXLCZ)99100000000081268420100301d2009 u| 0engurnn#008mamaatxtccrInformation Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers /edited by Heung Youl Youm, Moti Yung1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XIII, 386 p.)Security and Cryptology,2946-1863 ;5932Bibliographic Level Mode of Issuance: Monograph3-642-10837-7 Includes bibliographical references and index.Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption andIts Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009. The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.Security and Cryptology,2946-1863 ;5932CryptographyData encryption (Computer science)Computer networksComputer scienceMathematicsDiscrete mathematicsData protectionAlgorithmsCryptologyComputer Communication NetworksDiscrete Mathematics in Computer ScienceData and Information SecurityAlgorithmsMathematical Applications in Computer ScienceCryptography.Data encryption (Computer science).Computer networks.Computer scienceMathematics.Discrete mathematics.Data protection.Algorithms.Cryptology.Computer Communication Networks.Discrete Mathematics in Computer Science.Data and Information Security.Algorithms.Mathematical Applications in Computer Science.005.8Youm Heung Youl931005Yung Moti1071902WISA 2009MiAaPQMiAaPQMiAaPQBOOK9910483065303321Information security applications4199362UNINA