Information and Communications Security (Record no. 112944)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 05359nam a22005895i 4500 |
| 001 - CONTROL NUMBER | |
| control field | 978-3-642-17650-0 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | DE-He213 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20140220084551.0 |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr nn 008mamaa |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 101206s2010 gw | s |||| 0|eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9783642176500 |
| -- | 978-3-642-17650-0 |
| 024 7# - OTHER STANDARD IDENTIFIER | |
| Standard number or code | 10.1007/978-3-642-17650-0 |
| Source of number or code | doi |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | URY |
| Source | bicssc |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | COM053000 |
| Source | bisacsh |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.82 |
| Edition number | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Soriano, Miguel. |
| Relator term | editor. |
| 245 10 - TITLE STATEMENT | |
| Title | Information and Communications Security |
| Medium | [electronic resource] : |
| Remainder of title | 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings / |
| Statement of responsibility, etc | edited by Miguel Soriano, Sihan Qing, Javier López. |
| 264 #1 - | |
| -- | Berlin, Heidelberg : |
| -- | Springer Berlin Heidelberg, |
| -- | 2010. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | XIV, 474p. 120 illus. |
| Other physical details | online resource. |
| 336 ## - | |
| -- | text |
| -- | txt |
| -- | rdacontent |
| 337 ## - | |
| -- | computer |
| -- | c |
| -- | rdamedia |
| 338 ## - | |
| -- | online resource |
| -- | cr |
| -- | rdacarrier |
| 347 ## - | |
| -- | text file |
| -- | |
| -- | rda |
| 490 1# - SERIES STATEMENT | |
| Series statement | Lecture Notes in Computer Science, |
| International Standard Serial Number | 0302-9743 ; |
| Volume number/sequential designation | 6476 |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory and Practice -- Session 1A. Access Control -- Rewriting of SPARQL/Update Queries for Securing Data Access -- Fine-Grained Disclosure of Access Policies -- Session 1B. Public Key Cryptography and Cryptanalysis -- Manger’s Attack Revisited -- Horizontal Correlation Analysis on Exponentiation -- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts -- Session 1C. Security in Distributed and Mobile Systems -- A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks -- CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization -- SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms -- Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol -- Compromise-Resilient Anti-jamming for Wireless Sensor Networks -- Session 1D. Cryptanalysis -- On Practical Second-Order Power Analysis Attacks for Block Ciphers -- Consecutive S-box Lookups: A Timing Attack on SNOW 3G -- Session 2A. Authentication -- Efficient Authentication for Mobile and Pervasive Computing -- Security Enhancement and Modular Treatment towards Authenticated Key Exchange -- Federated Secret Handshakes with Support for Revocation -- Session 2B. Fair Exchange Protocols -- An Agent-Mediated Fair Exchange Protocol -- A New Method for Formalizing Optimistic Fair Exchange Protocols -- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme -- Session 2C. Anonymity and Privacy -- Proving Coercion-Resistance of Scantegrity II -- Anonymity and Verifiability in Voting: Understanding (Un)Linkability -- A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms -- Time Warp: How Time Affects Privacy in LBSs -- Session 2D. Software Security -- Return-Oriented Rootkit without Returns (on the x86) -- Experimental Threat Model Reuse with Misuse Case Diagrams -- Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis -- Session 3A. Proxy Cryptosystems -- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities -- Ciphertext Policy Attribute-Based Proxy Re-encryption -- Session 3B. Intrusion Detection Systems -- Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks -- A Trust-Based IDS for the AODV Protocol -- IDS Alert Visualization and Monitoring through Heuristic Host Selection -- A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised full papers presented together with an invited talk were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on access control, public key cryptography and cryptanalysis, security in distributed and mobile systems, cryptanalysis, authentication, fair exchange protocols, anonymity and privacy, software security, proxy cryptosystems, and intrusion detection systems. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer science. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer Communication Networks. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data protection. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data structures (Computer science). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data encryption (Computer science). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Coding theory. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer software. |
| 650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer Science. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data Encryption. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data Structures, Cryptology and Information Theory. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Coding and Information Theory. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Systems and Data Security. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Algorithm Analysis and Problem Complexity. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer Communication Networks. |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Qing, Sihan. |
| Relator term | editor. |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | López, Javier. |
| Relator term | editor. |
| 710 2# - ADDED ENTRY--CORPORATE NAME | |
| Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
| 773 0# - HOST ITEM ENTRY | |
| Title | Springer eBooks |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| Display text | Printed edition: |
| International Standard Book Number | 9783642176494 |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | Lecture Notes in Computer Science, |
| -- | 0302-9743 ; |
| Volume number/sequential designation | 6476 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-642-17650-0 |
| 912 ## - | |
| -- | ZDB-2-SCS |
| 912 ## - | |
| -- | ZDB-2-LNC |
No items available.