LEADER 01080nam 2200373 450 001 9910586642503321 005 20221013001754.0 010 $a1-80355-892-X 035 $a(CKB)4950000000722104 035 $a(NjHacI)994950000000722104 035 $a(EXLCZ)994950000000722104 100 $a20221013d2022 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAnticoagulation $eCurrent Perspectives /$fedited by Xingshun Qi, Xiaozhong Guo 210 1$aLondon :$cIntechOpen,$d2022. 215 $a1 online resource (138 pages) $cillustrations 311 $a1-80355-891-1 320 $aIncludes bibliographical references. 517 $aAnticoagulation 606 $aAnticoagulants (Medicine) 615 0$aAnticoagulants (Medicine) 676 $a615.7 702 $aQi$b Xingshun 702 $aGuo$b Xiaozhong 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910586642503321 996 $aAnticoagulation$92959454 997 $aUNINA LEADER 07120nam 22008055 450 001 9910768182403321 005 20251116234400.0 010 $a3-540-39981-X 024 7 $a10.1007/b13828 035 $a(CKB)1000000000212205 035 $a(SSID)ssj0000323992 035 $a(PQKBManifestationID)11234372 035 $a(PQKBTitleCode)TC0000323992 035 $a(PQKBWorkID)10304171 035 $a(PQKB)10109919 035 $a(DE-He213)978-3-540-39981-0 035 $a(MiAaPQ)EBC3087889 035 $a(PPN)15516676X 035 $a(EXLCZ)991000000000212205 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security $e6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings /$fedited by Colin Boyd, Wenbo Mao 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (XII, 448 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2851 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-20176-9 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- Revisiting Software Protection -- Network Security -- Enabling Shared Audit Data -- Cryptographically Generated Addresses (CGA) -- Validating and Securing Spontaneous Associations between Wireless Devices -- Single Sign-On Using Trusted Platforms -- Public-Key Algorithms -- Easy Verifiable Primitives and Practical Public Key Cryptosystems -- Reactively Secure Signature Schemes -- Validating Digital Signatures without TTP?s Time-Stamping and Certificate Revocation -- A Fast Signature Scheme Based on New On-line Computation -- Cryptographic Protocols -- Distributed RSA Signature Schemes for General Access Structures -- Divisible Voting Scheme -- Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations -- The Design and Implementation of Protocol-Based Hidden Key Recovery -- Invited Talk -- Intrinsic Limitations of Digital Signatures and How to Cope with Them -- Protocol Attacks -- On the Security of Fair Non-repudiation Protocols -- Security Analysis of a Password Authenticated Key Exchange Protocol -- Attacks on Public Key Algorithms -- Zero-Value Point Attacks on Elliptic Curve Cryptosystem -- Cryptanalysis of an Algebraic Privacy Homomorphism -- Analysis of the Insecurity of ECMQV with Partially Known Nonces -- Block Ciphers -- Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES -- A Note on Weak Keys of PES, IDEA, and Some Extended Variants -- Foundations of Differential Cryptanalysis in Abelian Groups -- Authorization -- Trust and Authorization in Pervasive B2E Scenarios -- A Logic Model for Temporal Authorization Delegation with Negation -- Watermarking -- Zero-Distortion Authentication Watermarking -- Designated Verification of Non-invertible Watermark -- Software Security -- Proactive Software Tampering Detection -- Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits -- Towards a Business Process-Driven Framework for Security Engineering with the UML -- Codes and Related Issues -- Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes -- Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations -- Short c-Secure Fingerprinting Codes -- The Role of Arbiters in Asymmetric Authentication Schemes. 330 $aThe 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year?s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2851 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputers, Special purpose 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aOperating systems (Computers) 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aBoyd$b Colin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMao$b Wenbo$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aISC (Conference : Information security) 906 $aBOOK 912 $a9910768182403321 996 $aInformation Security$9771885 997 $aUNINA