ASIACCS 2012 : the 7th ACM Symposium on Information, Computer and Communications Security : May 02-04, 2012, the Korea Federation of Science and Technology Societies (KOFST), Seoul, Korea |
Autore | Youm Heung Youl |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2012 |
Descrizione fisica | 1 online resource (119 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
ASIA Computer and Communications Security 2012 : the 7th Association for Computing Machinery Symposium on Information, Computer and Communications Security : May 02-04, 2012, the Korea Federation of Science and Technology Societies (KOFST), Seoul, Korea
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security ASIA CCS '12 7th ACM Symposium on Information, Computer and Communications Security, Seoul, Republic of Korea - May 02 - 04, 2012 |
Record Nr. | UNINA-9910375879003321 |
Youm Heung Youl
![]() |
||
[Place of publication not identified], : ACM, 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Applications [[electronic resource] ] : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / / edited by Heung Youl Youm, Moti Yung |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIII, 386 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer science—Mathematics Discrete mathematics Data protection Algorithms Cryptology Computer Communication Networks Discrete Mathematics in Computer Science Data and Information Security Mathematical Applications in Computer Science |
ISBN |
1-280-38536-7
9786613563286 3-642-10838-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs. |
Record Nr. | UNISA-996465916903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / / Heung Youl Youm, Moti Yung (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg, : Springer-Verlag, 2009 |
Descrizione fisica | 1 online resource (XIII, 386 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
YoumHeung Youl
YungMoti |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security - International cooperation
Data protection - International cooperation |
ISBN |
1-280-38536-7
9786613563286 3-642-10838-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs. |
Record Nr. | UNINA-9910483065303321 |
Berlin ; ; Heidelberg, : Springer-Verlag, 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|