LEADER 05781nam 22008295 450 001 996465890403316 005 20200702164820.0 010 $a1-280-38641-X 010 $a9786613564337 010 $a3-642-12827-0 024 7 $a10.1007/978-3-642-12827-1 035 $a(CKB)2550000000011539 035 $a(SSID)ssj0000399465 035 $a(PQKBManifestationID)11278654 035 $a(PQKBTitleCode)TC0000399465 035 $a(PQKBWorkID)10383548 035 $a(PQKB)10479977 035 $a(DE-He213)978-3-642-12827-1 035 $a(MiAaPQ)EBC3065258 035 $a(PPN)149073143 035 $a(EXLCZ)992550000000011539 100 $a20100509d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security, Practice and Experience$b[electronic resource] $e6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings /$fedited by Jin Kwak, Robert H. Deng, Guilin Wang, Yoojae Won 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 399 p. 68 illus.) 225 1 $aSecurity and Cryptology ;$v6047 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-12826-2 320 $aIncludes bibliographical references and index. 327 $aCryptanalysis -- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 -- Integral Attacks on Reduced-Round ARIA Block Cipher -- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance -- On the Security of NOEKEON against Side Channel Cube Attacks -- Algorithms and Implementations (I) -- On Fast and Approximate Attack Tree Computations -- Width-3 Joint Sparse Form -- Accelerating Inverse of GF(2 n ) with Precomputation -- Algorithms and Implementations (II) -- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis -- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups -- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables -- Network Security -- Host-Based Security Sensor Integrity in Multiprocessing Environments -- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating -- Rate-Based Watermark Traceback: A New Approach -- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes -- Access Control -- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk -- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), -- Identity Management -- A Trustworthy ID Management Mechanism in Open Market -- BioID: Biometric-Based Identity Management -- Trust Management -- Privacy Preserving of Trust Management Credentials Based on Trusted Computing -- Mitigating the Malicious Trust Expansion in Social Network Service -- Public Key Cryptography -- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification -- Certificateless KEM and Hybrid Signcryption Schemes Revisited -- A Deniable Group Key Establishment Protocol in the Standard Model -- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting -- Security Applications -- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis -- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles -- Attacking and Improving on Lee and Chiu?s Authentication Scheme Using Smart Cards -- Protection Profile for Secure E-Voting Systems. 410 0$aSecurity and Cryptology ;$v6047 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputers and civilization 606 $aComputer security 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aComputer security. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 615 24$aSystems and Data Security. 676 $a004.6 702 $aKwak$b Jin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeng$b Robert H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Guilin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWon$b Yoojae$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465890403316 996 $aInformation Security Practice and Experience$9772300 997 $aUNISA