LEADER 10157nam 22008295 450 001 996466000903316 005 20200703161445.0 010 $a3-642-29101-5 024 7 $a10.1007/978-3-642-29101-2 035 $a(CKB)3360000000365980 035 $a(SSID)ssj0000666158 035 $a(PQKBManifestationID)11447253 035 $a(PQKBTitleCode)TC0000666158 035 $a(PQKBWorkID)10664515 035 $a(PQKB)10665532 035 $a(DE-He213)978-3-642-29101-2 035 $a(MiAaPQ)EBC3070134 035 $a(PPN)168313677 035 $a(EXLCZ)993360000000365980 100 $a20120402d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Practice and Experience$b[electronic resource] $e8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings /$fedited by Mark D. Ryan, Ben Smyth, Guilin Wang 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIII, 406 p. 68 illus.) 225 1 $aSecurity and Cryptology ;$v7232 300 $aInternational conference proceedings. 311 $a3-642-29100-7 320 $aIncludes bibliographical references and author index. 327 $tA Pre-computable Signature Scheme with Efficient Verification for RFID /$rFuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan --$tRedactable Signatures for Independent Removal of Structure and Content /$rKai Samelin, Henrich C. Po?hls, Arne Bilzhause, Joachim Posegga and Hermann de Meer --$tImproved Efficiency of Chosen Ciphertext Secure Encryption from Factoring /$rXianhui Lu, Bao Li, Qixiang Mei and Yamin Liu --$tDeniable Encryptions Secure against Adaptive Chosen Ciphertext Attack /$rChong-zhi Gao, Dongqing Xie and Baodian Wei --$tComputational Soundness of Indistinguishability Properties without Computable Parsing /$rHubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto and Hideki Sakurada --$tNew Impossible Differential Attacks on Camellia /$rDongxia Bai and Leibo Li --$tImpossible Differential Attacks on Reduced-Round LBlock /$rYa Liu, Dawu Gu, Zhiqiang Liu and Wei Li --$tNew Truncated Differential Cryptanalysis on 3D Block Cipher /$rTakuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta. 327 $tiPIN and mTAN for Secure eID Applications /$rJohannes Braun, Moritz Horsch and Alexander Wiesmaier --$tSecure Distributed Computation of the Square Root and Applications /$rManuel Liedel --$tPrevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization /$rTian Shuo, He Yeping and Ding Baozeng --$tStructure-Based RSA Fault Attacks /$rBenjamin Miche?le, Juliane Kra?mer and Jean-Pierre Seifert --$tFault Analysis of the KATAN Family of Block Ciphers /$rShekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry --$tBiclique Cryptanalysis of Reduced-Round Piccolo Block Cipher /$rYanfeng Wang, Wenling Wu and Xiaoli Yu --$tOn the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers /$rZhenfei Zhang, Thomas Plantard and Willy Susilo --$tPartial Key Exposure on RSA with Private Exponents Larger Than N /$rMarc Joye and Tancre?de Lepoint --$tLinear Cryptanalysis of Reduced-Round ICEBERG /$rYue Sun and Meiqin Wang --$tOvercoming Significant Noise: Correlation-Template-Induction Attack /$rAn Wang, Man Chen, Zongyue Wang and Yaoling Ding. 327 $gPart 1.$tSpatio (Temporal) Data Modeling and Visualisation --$tUsability of Spatio-Temporal Uncertainty Visualisation Methods /$rHansi Senaratne, Lydia Gerharz, Edzer Pebesma and Angela Schwering --$tLine Simplification in the Presence of Non-Planar Topological Relationships /$rPadraig Corcoran, Peter Mooney and Michela Bertolotto --$tCritical Remarks on the Use of Conceptual Schemas in Geospatial Data Modelling-A Schema Translation Perspective /$rTatjana Kutzner and Andreas Donaubauer --$tPart 2.$tSpatial Data Infrastructures, Geo Web Services and Geo Semantic Web --$tTowards an Active Directory of Geospatial Web Services /$rFrancisco J. Lopez-Pellicer, Walter Renteri?a-Agualimpia, Javier Nogueras-Iso, F. Javier Zarazaga-Soria and Pedro R. Muro-Medrano --$tSpatial Sensor Web for the Prediction of Electric Power Supply System Behaviour /$rMilos? Bogdanovic?, Natas?a Veljkovic? and Leonid Stoimenov --$tLive Geoinformation with Standardized Geoprocessing Services /$rTheodor Foerster, Bastian Baranski and Harald Borsutzky --$tInterlinking Geospatial Information in the Web of Data /$rLuis M. Vilches-Bla?zquez, Vi?ctor Saquicela and Oscar Corcho --$tPart 3.$tModelling and Management of Uncertainty, Spatio (Temporal) Data Quality and Metadata --$tQualESTIM: Interactive Quality Assessment of Socioeconomic Data Using Outlier Detection /$rChristine Plumejeaud and Marle?ne Villanova-Oliver --$tDistributed Integration of Spatial Data with Different Positional Accuracies /$rAlberto Belussi and Sara Migliorini --$tThrough a Fuzzy Spatiotemporal Information System for Handling Excavation Data /$rAsma Zoghlami, Cyril de Runz, Herman Akdag and Dominique Pargny --$tPart 4.$tMobility of Persons, Objects and Systems, Transports and Flows --$tUsing Weather Information to Improve Route Planning /$rPaul Litzinger, Gerhard Navratil, A?ke Sivertun and Daniela Knorr --$tSimulation of Laser Attacks against Aircrafts /$rVa?clav Talhofer, Teodor Bala?z?, Frantis?ek Racek, Alois Hofmann and S?a?rka Hos?kova?-Mayerova? --$tAutomated Traffic Route Identification Through the Shared Nearest Neighbour Algorithm /$rMaribel Yasmina Santos, Joaquim P. Silva, Joa?o Moura-Pires and Monica Wachowicz --$tPart 5.$tSpatial Analysis, Geostatistics, and Geo Information Retrieval --$tComparing Support Vector Regression and Statistical Linear Regression for Predicting Poverty Incidence in Vietnam /$rCornelius Senf and Tobia Lakes --$tDo Expressive Geographic Queries Lead to Improvement in Retrieval Effectiveness? /$rDamien Palacio, Christian Sallaberry, Guillaume Cabanac, Gilles Hubert and Mauro Gaio --$tThe GP-SET Method: A Spatial and Temporal Probabilistic Model for Geoprospective /$rSte?phane Bourrelly and Christine Voiron-Canicio --$tPart 6.$tModelling and Spatial Analysis of Urban Dynamics, Urban GIS --$tPredicting Spatiotemporal Distribution of Transient Occupants in Urban Areas /$rToshihiro Osaragi and Takeshi Hoshino --$tTowards Urban Fabrics Characterization Based on Buildings Footprints /$rRachid Hamaina, Thomas Leduc and Guillaume Moreau --$tThe Use of Point Pattern Statistics in UrbanAnalysis /$rIoannis Pissourios, Pery Lafazani, Stavros Spyrellis, Anastasia Christodoulou and Myron Myridis --$tPart 7.$tGIS and Spatial Analysis for Global Change Modelling, Impact on Space --$tBeach-Dune Morphological Relationships at Youghal Beach, Cork /$rSarah Kandrot --$tA New Method for Computing the Drainage Network Based on Raising the Level of an Ocean Surrounding the Terrain /$rSalles V. G. Magalha?es, Marcus V. A. Andrade, W. Randolph Franklin and Guilherme C. Pena --$tPart 8.$tGeographic Information Science: Links with other Disciplines and Citizens --$tGeographic Information Science as a Common Cause for Interdisciplinary Research /$rThomas Blaschke, Josef Strobl, Lothar Schrott, Robert Marschallinger and Franz Neubauer, et al. --$tEnhancing the Quality of Volunteered Geographic Information: A Constraint-Based Approach /$rOlga Yanenko and Christoph Schlieder. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are oranized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery. 410 0$aSecurity and Cryptology ;$v7232 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputer communication systems 606 $aInformation storage and retrieval 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aInformation storage and retrieval. 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aInformation Storage and Retrieval. 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aRyan$b Mark D$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSmyth$b Ben$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Guilin$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466000903316 996 $aInformation Security Practice and Experience$9772300 997 $aUNISA