My Account Log in

1 option

Information Security Applications : 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers / edited by Jooseok Song, Taekyoung Kwon.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Song, JooSeok, editor.
Kwon, Taekyoung, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 3786.
Security and Cryptology ; 3786
Language:
English
Subjects (All):
Data encryption (Computer science).
Operating systems (Computers).
Algorithms.
Computer networks.
Management information systems.
Computer science.
Computers, Special purpose.
Cryptology.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Special Purpose and Application-Based Systems.
Local Subjects:
Cryptology.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Special Purpose and Application-Based Systems.
Physical Description:
1 online resource (XII, 378 pages).
Edition:
First edition 2006.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
System Details:
text file PDF
Contents:
Security Analysis and Attacks
Security Weakness in Ren and others's Group Key Agreement Scheme Built on Secure Two-Party Protocols
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Application of LFSRs in Time/Memory Trade-Off Cryptanalysis
System Security
An Alert Data Mining Framework for Network-Based Intrusion Detection System
Key Factors Influencing Worm Infection in Enterprise Networks
Evaluation of the Unified Modeling Language for Security Requirements Analysis
Network Security
A Simple and Efficient Conference Scheme for Mobile Communications
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network
Efficient Multicast Stream Authentication for the Fully Adversarial Network Model
Elastic Security QoS Provisioning for Telematics Applications
DRM/Software Security
An Improved Algorithm to Watermark Numeric Relational Data
Video Fingerprinting System Using Wavelet and Error Correcting Code
Secure Asymmetric Watermark Detection Without Secret of Modified Pixels
Kimchi: A Binary Rewriting Defense Against Format String Attacks
Software Protection Through Dynamic Code Mutation
Efficient HW Implementation
Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m )
Developing and Implementing IHPM on IXP 425 Network Processor Platforms
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices
mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors
Side-Channel Attacks
Practical Modifications of Leadbitter and others's Repeated-Bits Side-Channel Analysis on (EC)DSA
A DPA Countermeasure by Randomized Frobenius Decomposition
DPA Attack on the Improved Ha-Moon Algorithm
An Efficient Masking Scheme for AES Software Implementations
Privacy/Anonymity
Secure Multi-attribute Procurement Auction
Oblivious Conjunctive Keyword Search
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption
Efficient Implementation
New Concept of Authority Range for Flexible Management of Role Hierarchy
Role-Based Access Control Model for Ubiquitous Computing Environment
Designing Security Auditing Protocol with Web Browsers.
Other Format:
Printed edition:
ISBN:
978-3-540-33153-7
9783540331537
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account