| 000 | 04455nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-16825-3 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084550.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 101101s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642168253 _9978-3-642-16825-3 |
||
| 024 | 7 |
_a10.1007/978-3-642-16825-3 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aUTN _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aEchizen, Isao. _eeditor. |
|
| 245 | 1 | 0 |
_aAdvances in Information and Computer Security _h[electronic resource] : _b5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings / _cedited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXIII, 371p. 83 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6434 |
|
| 505 | 0 | _aInvited Talks -- Automating Security Configuration and Administration: An Access Control Perspective -- Security Metrics and Security Investment Models -- Encryption -- Publishing Upper Half of RSA Decryption Exponent -- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples -- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model -- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme -- Data and Web Security -- Practical Universal Random Sampling -- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints -- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel -- Validating Security Policy Conformance with WS-Security Requirements -- Protocols -- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption -- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage -- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE -- Network Security -- A Generic Binary Analysis Method for Malware -- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs -- Securing MANET Multicast Using DIPLOMA -- Block Cipher -- Preimage Attacks against Variants of Very Smooth Hash -- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification -- Mutual Information Analysis under the View of Higher-Order Statistics -- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter -- Implementation and Real Life Security -- Differential Addition in Generalized Edwards Coordinates -- Efficient Implementation of Pairing on BREW Mobile Phones -- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases -- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees. | |
| 520 | _aThis book constitutes the refereed proceedings of the 5th International Workshop on Security, IWSEC 2010, held in Kobe, Japan, in November 2010. The 22 revised full papers presented together with 2 invited talk were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on encryption, data and web security, protocols, network security, block cipher, and implementation and real life security. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aComputer software. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aComputers and Society. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 700 | 1 |
_aKunihiro, Noboru. _eeditor. |
|
| 700 | 1 |
_aSasaki, Ryoichi. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642168246 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6434 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-16825-3 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c112873 _d112873 |
||