LEADER 06169nam 22008775 450 001 9910484216603321 005 20250626164402.0 010 $a3-642-04474-3 024 7 $a10.1007/978-3-642-04474-8 035 $a(CKB)1000000000784733 035 $a(SSID)ssj0000318264 035 $a(PQKBManifestationID)11241008 035 $a(PQKBTitleCode)TC0000318264 035 $a(PQKBWorkID)10308875 035 $a(PQKB)11721572 035 $a(DE-He213)978-3-642-04474-8 035 $a(MiAaPQ)EBC3064583 035 $a(PPN)139955763 035 $a(EXLCZ)991000000000784733 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security $e12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings /$fedited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XIV, 508 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5735 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-04473-5 320 $aIncludes bibliographical references and index. 327 $aAnalysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR ? A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature inthe Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the ?Second? Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009. The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5735 606 $aComputer science$xMathematics 606 $aComputer programming 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aMathematics of Computing 606 $aProgramming Techniques 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aMathematical Applications in Computer Science 615 0$aComputer science$xMathematics. 615 0$aComputer programming. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aAlgorithms. 615 14$aMathematics of Computing. 615 24$aProgramming Techniques. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aMathematical Applications in Computer Science. 676 $a005.822gerDNB 686 $aDAT 050f$2stub 686 $aDAT 460f$2stub 686 $aSS 4800$2rvk 701 $aSamarati$b Pierangela$01430844 701 $aArdagna$b Claudio A$01588549 701 $aMartinelli$b Fabio$0600345 701 $aYung$b Moti$01071902 712 12$aISC (Conference : Information security) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484216603321 996 $aInformation security$94186454 997 $aUNINA