Information, Security and Cryptology – ICISC 2009 (Record no. 112471)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04203nam a22005775i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-642-14423-3 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20140220084542.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100618s2010 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783642144233 |
-- | 978-3-642-14423-3 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-642-14423-3 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.5-5105.9 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UKN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM075000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Lee, Donghoon. |
Relator term | editor. |
245 10 - TITLE STATEMENT | |
Title | Information, Security and Cryptology – ICISC 2009 |
Medium | [electronic resource] : |
Remainder of title | 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers / |
Statement of responsibility, etc | edited by Donghoon Lee, Seokhie Hong. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg, |
-- | 2010. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIII, 387p. 70 illus. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 0302-9743 ; |
Volume number/sequential designation | 5984 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Key Management and Key Exchange -- Generic One Round Group Key Exchange in the Standard Model -- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange -- Efficient Certificateless KEM in the Standard Model -- Public Key Cryptography -- Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing -- Factoring Unbalanced Moduli with Known Bits -- Algebraic Cryptanalysis and Stream Cipher -- Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared -- MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals -- Improved Linear Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree Computations -- Lightweight Cryptography and RFID: Tackling the Hidden Overheads -- Side Channel Attack -- Power Analysis of Single-Rail Storage Elements as Used in MDPL -- A Timing Attack against Patterson Algorithm in the McEliece PKC -- Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications -- Privacy Enhanced Technology -- First CPIR Protocol with Data-Dependent Computation -- Efficient Fuzzy Matching and Intersection on Private Datasets -- Efficient Privacy-Preserving Face Recognition -- Cryptographic Protocol -- Linear, Constant-Rounds Bit-Decomposition -- Attacking and Repairing the Improved ModOnions Protocol -- Secret Handshakes with Revocation Support -- Cryptanalysis of Hash Function -- Practical Rebound Attack on 12-Round Cheetah-256 -- Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash -- Improved Preimage Attack for 68-Step HAS-160 -- Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1 -- Network Security -- Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson -- Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the proceedings of the 12th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2009. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer software. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computational complexity. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information Systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Management of Computing and Information Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithm Analysis and Problem Complexity. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Discrete Mathematics in Computer Science. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Hong, Seokhie. |
Relator term | editor. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783642144226 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
-- | 0302-9743 ; |
Volume number/sequential designation | 5984 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-642-14423-3 |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.