top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security and Cryptology - ICISC 2002 [[electronic resource] ] : 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers / / edited by Pil Joong Lee, Chae Hoon Lim
Information Security and Cryptology - ICISC 2002 [[electronic resource] ] : 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers / / edited by Pil Joong Lee, Chae Hoon Lim
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 544 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 3-540-36552-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Cut-&-Paste Attacks with JAVA -- Digital Signatures -- Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption -- New DSA-Verifiable Signcryption Schemes -- Convertible Group Undeniable Signatures -- An Efficient Fail-Stop Signature Scheme Based on Factorization -- On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme -- Internet Security -- System Specification Based Network Modeling for Survivability Testing Simulation -- A Risk-Sensitive Intrusion Detection Model -- Applet Verification Strategies for RAM-Constrained Devices -- Block/Stream Ciphers -- Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks -- Consistent Differential Patterns of Rijndael -- Hardware Design and Analysis of Block Cipher Components -- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt -- Stream Ciphers & Other Primitives -- On the Efficiency of the Clock Control Guessing Attack -- Balanced Shrinking Generators -- On the Universal Hash Functions in Luby-Rackoff Cipher -- Threshold MACs -- Ideal Threshold Schemes from MDS Codes -- Efficient Implementations -- New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms -- Efficient Computations of the Tate Pairing for the Large MOV Degrees -- Improved Techniques for Fast Exponentiation -- Efficient Hardware Multiplicative Inverters -- Side-Channel Attacks -- Ways to Enhance Differential Power Analysis -- A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion -- A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem -- Hardware Fault Attack on RSA with CRT Revisited -- Cryptographic Protocols I -- Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer -- Non-interactive Auction Scheme with Strong Privacy -- An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control -- Speeding Up Secure Sessions Establishment on the Internet -- Cryptographic Protocols II -- On Fairness in Exchange Protocols -- A Model for Embedding and Authorizing Digital Signatures in Printed Documents -- A Dynamic Group Key Distribution Scheme with Flexible User Join -- Efficient Multicast Key Management for Stateless Receivers -- Biometrics -- Fingerprint Verification System Involving Smart Card -- A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation.
Record Nr. UNISA-996465642803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology - ICISC 2002 : 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers / / edited by Pil Joong Lee, Chae Hoon Lim
Information Security and Cryptology - ICISC 2002 : 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers / / edited by Pil Joong Lee, Chae Hoon Lim
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 544 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 3-540-36552-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Cut-&-Paste Attacks with JAVA -- Digital Signatures -- Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption -- New DSA-Verifiable Signcryption Schemes -- Convertible Group Undeniable Signatures -- An Efficient Fail-Stop Signature Scheme Based on Factorization -- On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme -- Internet Security -- System Specification Based Network Modeling for Survivability Testing Simulation -- A Risk-Sensitive Intrusion Detection Model -- Applet Verification Strategies for RAM-Constrained Devices -- Block/Stream Ciphers -- Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks -- Consistent Differential Patterns of Rijndael -- Hardware Design and Analysis of Block Cipher Components -- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt -- Stream Ciphers & Other Primitives -- On the Efficiency of the Clock Control Guessing Attack -- Balanced Shrinking Generators -- On the Universal Hash Functions in Luby-Rackoff Cipher -- Threshold MACs -- Ideal Threshold Schemes from MDS Codes -- Efficient Implementations -- New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms -- Efficient Computations of the Tate Pairing for the Large MOV Degrees -- Improved Techniques for Fast Exponentiation -- Efficient Hardware Multiplicative Inverters -- Side-Channel Attacks -- Ways to Enhance Differential Power Analysis -- A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion -- A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem -- Hardware Fault Attack on RSA with CRT Revisited -- Cryptographic Protocols I -- Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer -- Non-interactive Auction Scheme with Strong Privacy -- An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control -- Speeding Up Secure Sessions Establishment on the Internet -- Cryptographic Protocols II -- On Fairness in Exchange Protocols -- A Model for Embedding and Authorizing Digital Signatures in Printed Documents -- A Dynamic Group Key Distribution Scheme with Flexible User Join -- Efficient Multicast Key Management for Stateless Receivers -- Biometrics -- Fingerprint Verification System Involving Smart Card -- A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation.
Record Nr. UNINA-9910143882403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers / / edited by Chae Hoon Lim, Moti Yung
Information Security Applications [[electronic resource] ] : 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers / / edited by Chae Hoon Lim, Moti Yung
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 472 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Computer networks
Electronic data processing—Management
Computers, Special purpose
Cryptology
Operating Systems
Computer Communication Networks
IT Operations
Special Purpose and Application-Based Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Encryption with Conjunctive Field Keyword Search -- Intrusion Detection I -- A Probabilistic Method for Detecting Anomalous Program Behavior -- Service Discrimination and Audit File Reduction for Effective Intrusion Detection -- IDS False Alarm Filtering Using KNN Classifier -- Watermarking/Anti-spamming -- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking -- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment -- Public Key Schemes II -- Efficient Authenticated Key Agreement Protocol for Dynamic Groups -- A Ring Signature Scheme Using Bilinear Pairings -- Verifiable Pairing and Its Applications -- Intrusion Detection II -- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading -- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks -- Application of Content Computing in Honeyfarm -- Digital Rights Management -- License Protection with a Tamper-Resistant Token -- An Adaptive Approach to Hardware Alteration for Digital Rights Management -- Dynamic Fingerprinting over Broadcast Using Revocation Scheme -- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels -- e-Commerce Security -- Vulnerability of a Mobile Payment System Proposed at WISA 2002 -- Fair Offline Payment Using Verifiable Encryption -- A Limited-Used Key Generation Scheme for Internet Transactions -- Efficient Implementation -- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes -- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II -- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors -- Hyperelliptic Curve Coprocessors on a FPGA -- Anonymous Communication -- Key-Exchange Protocol Using Pre-agreed Session-ID -- A New k-Anonymous Message Transmission Protocol -- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack -- Side-Channel Attacks -- Side Channel Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template Attacks -- Evaluation and Improvement of the Tempest Fonts.
Record Nr. UNISA-996465473403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers / / Chae Hoon Lim, Moti Yung (eds.)
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers / / Chae Hoon Lim, Moti Yung (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2005
Descrizione fisica 1 online resource (XII, 472 p.)
Disciplina 005.8
Altri autori (Persone) LimChae Hoon
YungMoti
Collana Lecture notes in computer science
Soggetto topico Computer security - International cooperation
Data protection - International cooperation
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Encryption with Conjunctive Field Keyword Search -- Intrusion Detection I -- A Probabilistic Method for Detecting Anomalous Program Behavior -- Service Discrimination and Audit File Reduction for Effective Intrusion Detection -- IDS False Alarm Filtering Using KNN Classifier -- Watermarking/Anti-spamming -- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking -- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment -- Public Key Schemes II -- Efficient Authenticated Key Agreement Protocol for Dynamic Groups -- A Ring Signature Scheme Using Bilinear Pairings -- Verifiable Pairing and Its Applications -- Intrusion Detection II -- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading -- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks -- Application of Content Computing in Honeyfarm -- Digital Rights Management -- License Protection with a Tamper-Resistant Token -- An Adaptive Approach to Hardware Alteration for Digital Rights Management -- Dynamic Fingerprinting over Broadcast Using Revocation Scheme -- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels -- e-Commerce Security -- Vulnerability of a Mobile Payment System Proposed at WISA 2002 -- Fair Offline Payment Using Verifiable Encryption -- A Limited-Used Key Generation Scheme for Internet Transactions -- Efficient Implementation -- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes -- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II -- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors -- Hyperelliptic Curve Coprocessors on a FPGA -- Anonymous Communication -- Key-Exchange Protocol Using Pre-agreed Session-ID -- A New k-Anonymous Message Transmission Protocol -- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack -- Side-Channel Attacks -- Side Channel Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template Attacks -- Evaluation and Improvement of the Tempest Fonts.
Altri titoli varianti WISA 2004
Record Nr. UNINA-9910484261803321
Berlin ; ; New York, : Springer, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui