| 000 | 04160nam a22005775i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-14081-5 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084541.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100924s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642140815 _9978-3-642-14081-5 |
||
| 024 | 7 |
_a10.1007/978-3-642-14081-5 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.82 _223 |
| 100 | 1 |
_aSteinfeld, Ron. _eeditor. |
|
| 245 | 1 | 0 |
_aInformation Security and Privacy _h[electronic resource] : _b15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings / _cedited by Ron Steinfeld, Philip Hawkes. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXII, 403p. 40 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6168 |
|
| 505 | 0 | _aSymmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. | |
| 520 | _aThis book constitutes the refereed proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP 2010, held in Sydney, Australia, in July 2010. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric key encryption; hash functions; public key cryptography; protocols; and network security. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aComputer software. | |
| 650 | 0 | _aComputational complexity. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
| 700 | 1 |
_aHawkes, Philip. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642140808 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6168 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-14081-5 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c112406 _d112406 |
||