Cryptology and Network Security [[electronic resource] ] : 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings / / edited by Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 355 p. 66 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer programming Computer science—Mathematics Coding theory Information theory Data structures (Computer science) Cryptology Computer Communication Networks Programming Techniques Discrete Mathematics in Computer Science Coding and Information Theory Data Structures and Information Theory |
ISBN |
1-280-39072-7
9786613568649 3-642-17619-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds -- An Algorithm Based Concurrent Error Detection Scheme for AES -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems -- Generating Parameters for Algebraic Torus-Based Cryptosystems -- Analysis of the MQQ Public Key Cryptosystem -- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) -- Secure Mechanisms -- Towards a Cryptographic Treatment of Publish/Subscribe Systems -- STE3D-CAP: Stereoscopic 3D CAPTCHA -- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic Group Key Exchange Revisited -- Towards Practical and Secure Coercion-Resistant Electronic Elections -- Anonymous Credentials -- Predicate Encryption with Partial Public Keys -- Anonymous Credential Schemes with Encrypted Attributes -- One Time Anonymous Certificate: X.509 Supporting Anonymity. |
Record Nr. | UNISA-996465681303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security : 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings / / edited by Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 355 p. 66 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer programming Computer science—Mathematics Coding theory Information theory Data structures (Computer science) Cryptology Computer Communication Networks Programming Techniques Discrete Mathematics in Computer Science Coding and Information Theory Data Structures and Information Theory |
ISBN |
1-280-39072-7
9786613568649 3-642-17619-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds -- An Algorithm Based Concurrent Error Detection Scheme for AES -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems -- Generating Parameters for Algebraic Torus-Based Cryptosystems -- Analysis of the MQQ Public Key Cryptosystem -- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) -- Secure Mechanisms -- Towards a Cryptographic Treatment of Publish/Subscribe Systems -- STE3D-CAP: Stereoscopic 3D CAPTCHA -- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic Group Key Exchange Revisited -- Towards Practical and Secure Coercion-Resistant Electronic Elections -- Anonymous Credentials -- Predicate Encryption with Partial Public Keys -- Anonymous Credential Schemes with Encrypted Attributes -- One Time Anonymous Certificate: X.509 Supporting Anonymity. |
Record Nr. | UNINA-9910484660403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|