My Account Log in

1 option

Information Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers / edited by Dongho Won, Seungjoo Kim.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Won, Dongho, 1949- editor.
Kim, Seungjoo, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 3935.
Lecture Notes in Computer Science, 0302-9743 ; 3935
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer science--Mathematics.
Operating systems (Computers).
Management information systems.
Computer science.
Algorithms.
Computer networks.
Cryptology.
Discrete Mathematics in Computer Science.
Operating Systems.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Local Subjects:
Cryptology.
Discrete Mathematics in Computer Science.
Operating Systems.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Physical Description:
1 online resource (XIV, 458 pages).
Edition:
First edition 2006.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
System Details:
text file PDF
Contents:
Invited Talks
National Security, Forensics and Mobile Communications
Information Security as Interdisciplinary Science Based on Ethics
Key Management and Distributed Cryptography
A Timed-Release Key Management Scheme for Backward Recovery
Property-Based Broadcast Encryption for Multi-level Security Policies
Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption
Authentication and Biometrics
An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image
Trust Management for Resilient Wireless Sensor Networks
Improvements to Mitchell's Remote User Authentication Protocol
Efficient Authenticators with Application to Key Exchange
Provable Security and Primitives
Benes and Butterfly Schemes Revisited
Relative Doubling Attack Against Montgomery Ladder
Improved Collision Attack on MD4 with Probability Almost 1
Finding Collision on 45-Step HAS-160
System/Network Security
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
The Dilemma of Covert Channels Searching
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks
Foundations of Attack Trees
Block/Stream Ciphers (I)
An Algebraic Masking Method to Protect AES Against Power Attacks
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes
Integral Cryptanalysis of Reduced FOX Block Cipher
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components
Block/Stream Ciphers (II)
Cryptanalysis of Sfinks
Weaknesses of COSvd (2,128) Stream Cipher
Expanding Weak PRF with Small Key Size
On Linear Systems of Equations with Distinct Variables and Small Block Size
Efficient Implementations
An FPGA Implementation of CCM Mode Using AES
New Architecture for Multiplication in GF(2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography
An Efficient Design of CCMP for Robust Security Network
Digital Rights Management
Software-Based Copy Protection for Temporal Media During Dissemination and Playback
Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme
Public Key Cryptography
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms
An Efficient Static Blind Ring Signature Scheme
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model
Yet Another Forward Secure Signature from Bilinear Pairings.
Other Format:
Printed edition:
ISBN:
978-3-540-33355-5
9783540333555
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account