LEADER 01783nas--2200517---4500 001 990000496100203316 005 20130107113453.0 011 $a1725-6763 035 $a0049610 035 $aUSA010049610 035 $a(ALEPH)000049610USA01 035 $a0049610 100 $a2001060712005----km-y0ITAy0103----ba 101 0 $aeng 102 $aIE 110 $aajaz---|||| 200 1 $aFoundation Focus$fEuropean foundation for the improvement of living and working conditions 207 0$aN.1(Oct. 2005)- 210 $aDublin$cEuropean foundation for the improvement of living and working conditions$d2005- 215 $av.$d30 cm 326 $aSemestrale 606 0 $aLavoro$yEuropa$xPeriodici 676 $a331.05 699 $a01.06$bEurofound 712 02$aFONDAZIONE EUROPEA PER IL MIGLIORAMENTO DELLE CONDIZIONI DI VITA E DI LAVORO 801 0$aIT$bsalbc$gISBD 856 4 $uhttp://www.eurofound.europa.eu/publications/htmlfiles/ef0521.htm$4.$zAccesso online 912 $a990000496100203316 958 $aCDE$bCDE / FOF$c2005-$l2007; 959 $aSE 969 $aCDE 979 $aPATTY$b90$c20010607$lUSA01$h1107 979 $c20020403$lUSA01$h1658 979 $aPATRY$b90$c20040406$lUSA01$h1634 979 $aPATRY$b90$c20060718$lUSA01$h1707 979 $aMARIAS$b90$c20080218$lUSA01$h0916 979 $aMARIAS$b90$c20080218$lUSA01$h0921 979 $aMARIAS$b90$c20080218$lUSA01$h0923 979 $aMARIAS$b90$c20080220$lUSA01$h1236 979 $aMARIAS$b90$c20080221$lUSA01$h1123 979 $aMARIAS$b90$c20080926$lUSA01$h1128 979 $aMARIAS$b90$c20080926$lUSA01$h1131 979 $aMARIAS$b90$c20091021$lUSA01$h1044 979 $aMARIAS$b90$c20130107$lUSA01$h1134 996 $aFoundation Focus$9887735 997 $aUNISA LEADER 03974nam 2200601 450 001 996465544203316 005 20220424113756.0 010 $a3-540-89598-1 024 7 $a10.1007/978-3-540-89598-5 035 $a(CKB)1000000000545761 035 $a(SSID)ssj0000315987 035 $a(PQKBManifestationID)11212463 035 $a(PQKBTitleCode)TC0000315987 035 $a(PQKBWorkID)10263041 035 $a(PQKB)10849936 035 $a(DE-He213)978-3-540-89598-5 035 $a(MiAaPQ)EBC3063735 035 $a(MiAaPQ)EBC6696235 035 $a(Au-PeEL)EBL6696235 035 $a(PPN)13286150X 035 $a(EXLCZ)991000000000545761 100 $a20220424d2008 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aAdvances in information and computer security $eThird International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings /$fKanta Matsuura, Eiichiro Fujisaki (editors) 205 $a1st ed. 2008. 210 1$aBerlin ;$aHeidelberg ;$aNew York :$cSpringer,$d[2008] 210 4$d©2008 215 $a1 online resource (XII, 299 p.) 225 1 $aLecture notes in computer science ;$v5312 300 $aInternational conference proceedings. 311 $a3-540-89597-3 320 $aIncludes bibliographical references and index. 327 $aCryptography -- On Generating Elements of Orders Dividing p 2k ±p k ?+?1 -- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure -- Remarks on the Attack of Fouque et al. against the ?IC Scheme -- Signature and Signcryption -- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles -- Signcryption Scheme in Multi-user Setting without Random Oracles -- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices -- Software Security -- The Superdiversifier: Peephole Individualization for Software Protection -- Detecting Java Theft Based on Static API Trace Birthmark -- Online Network Forensics for Automatic Repair Validation -- Return Value Predictability Profiles for Self?healing -- Privacy Protection and Contents Protection -- Involuntary Information Leakage in Social Network Services -- Privacy Preserving Computations without Public Key Cryptographic Operation -- A Novel Framework for Watermarking: The Data-Abstracted Approach -- Invited Talk -- The Elliptic Curve Discrete Logarithm Problem: State of the Art -- Authentication and Access Control -- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication -- Analysis of a Biometric Authentication Protocol for Signature Creation Application -- Efficient Secure Labeling Method under Dynamic XML Data Streams -- Implementation -- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems -- The Long-Short-Key Primitive and Its Applications to Key Security. 330 $aThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008. The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on cryptography, signature and signcryption, software security, privacy protection and contents protection, authentication and access control, as well as implementation. 410 0$aLecture notes in computer science ;$v5312. 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 686 $a54.30$2bcl 702 $aMatsuura$b Kanta 702 $aFujisaki$b Eiichiro 712 12$aInternational Workshop on Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465544203316 996 $aAdvances in Information and Computer Security$92030577 997 $aUNISA