LEADER 04141nam 22006735 450 001 9910741159403321 005 20200706235536.0 010 $a3-642-38033-6 024 7 $a10.1007/978-3-642-38033-4 035 $a(CKB)3280000000007621 035 $a(DE-He213)978-3-642-38033-4 035 $a(SSID)ssj0000904582 035 $a(PQKBManifestationID)11484441 035 $a(PQKBTitleCode)TC0000904582 035 $a(PQKBWorkID)10924022 035 $a(PQKB)10459294 035 $a(MiAaPQ)EBC3093001 035 $a(PPN)170491714 035 $a(EXLCZ)993280000000007621 100 $a20130508d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Practice and Experience $e9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings /$fedited by Robert H. Deng, Tao Feng 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 388 p. 72 illus.) 225 1 $aSecurity and Cryptology ;$v7863 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-38032-8 327 $aEnhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection -- Trusted Identity Management for Overlay Networks -- Situational Awareness for Improving Network Resilience Management -- Optimal Defense Strategies for DDoS defender using Bayesian Game Model -- Identity-Based Cryptography -- Attribute Specified Identity-Based Encryption -- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions -- Identity-based Multisignature with Message Recovery -- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme -- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release -- About Hash into Montgomery Form Elliptic Curves -- Secure RFID Ownership Transfer Protocols -- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model -- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control -- Cryptanalysis of the OKH Authenticated Encryption Scheme. 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks. 410 0$aSecurity and Cryptology ;$v7863 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aDeng$b Robert H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFeng$b Tao$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910741159403321 996 $aInformation Security Practice and Experience$9772300 997 $aUNINA