top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Applications [[electronic resource] ] : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / / edited by Kim Sehun, Moti Yung, Hyung-Woo Lee
Information Security Applications [[electronic resource] ] : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / / edited by Kim Sehun, Moti Yung, Hyung-Woo Lee
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XIII, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Computer networks
Electronic data processing—Management
Computers, Special purpose
Cryptology
Data and Information Security
Computer Communication Networks
IT Operations
Special Purpose and Application-Based Systems
ISBN 3-540-77535-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Crypto Applications -- Universal ? T Pairing Algorithm over Arbitrary Extension Degree -- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction -- Secret Signatures: How to Achieve Business Privacy Efficiently? -- Biometrics/Information Hiding -- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model -- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms -- Geometrically Invariant Image Watermarking in the DWT Domain -- Secure Hardware -- Implementation of LSM-Based RBAC Module for Embedded System -- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations -- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor -- Secure Systems -- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine -- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks -- Detecting Motifs in System Call Sequences -- Wireless and Mobile Security -- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System -- Breaking 104 Bit WEP in Less Than 60 Seconds -- Efficient Implementation of the Pairing on Mobilephones Using BREW -- Application Security/Secure Systems -- Security Analysis of MISTY1 -- A Generic Method for Secure SBox Implementation -- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences -- Access Control/DB Security -- Authorization Constraints Specification of RBAC -- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk -- A Compositional Multiple Policies Operating System Security Model -- Smart Cards/Secure Systems -- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones -- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC -- Anonymity and P2P Security -- Risk & Distortion Based K-Anonymity -- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System -- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.
Record Nr. UNISA-996466254603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / / edited by Kim Sehun, Moti Yung, Hyung-Woo Lee
Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / / edited by Kim Sehun, Moti Yung, Hyung-Woo Lee
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XIII, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Computer networks
Electronic data processing—Management
Computers, Special purpose
Cryptology
Data and Information Security
Computer Communication Networks
IT Operations
Special Purpose and Application-Based Systems
ISBN 3-540-77535-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Crypto Applications -- Universal ? T Pairing Algorithm over Arbitrary Extension Degree -- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction -- Secret Signatures: How to Achieve Business Privacy Efficiently? -- Biometrics/Information Hiding -- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model -- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms -- Geometrically Invariant Image Watermarking in the DWT Domain -- Secure Hardware -- Implementation of LSM-Based RBAC Module for Embedded System -- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations -- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor -- Secure Systems -- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine -- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks -- Detecting Motifs in System Call Sequences -- Wireless and Mobile Security -- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System -- Breaking 104 Bit WEP in Less Than 60 Seconds -- Efficient Implementation of the Pairing on Mobilephones Using BREW -- Application Security/Secure Systems -- Security Analysis of MISTY1 -- A Generic Method for Secure SBox Implementation -- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences -- Access Control/DB Security -- Authorization Constraints Specification of RBAC -- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk -- A Compositional Multiple Policies Operating System Security Model -- Smart Cards/Secure Systems -- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones -- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC -- Anonymity and P2P Security -- Risk & Distortion Based K-Anonymity -- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System -- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.
Record Nr. UNINA-9910483953103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui