000 04878nam a22005895i 4500
001 978-3-642-12827-1
003 DE-He213
005 20140220084536.0
007 cr nn 008mamaa
008 100509s2010 gw | s |||| 0|eng d
020 _a9783642128271
_9978-3-642-12827-1
024 7 _a10.1007/978-3-642-12827-1
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aKwak, Jin.
_eeditor.
245 1 0 _aInformation Security, Practice and Experience
_h[electronic resource] :
_b6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings /
_cedited by Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXIII, 399p. 68 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6047
505 0 _aCryptanalysis -- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 -- Integral Attacks on Reduced-Round ARIA Block Cipher -- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance -- On the Security of NOEKEON against Side Channel Cube Attacks -- Algorithms and Implementations (I) -- On Fast and Approximate Attack Tree Computations -- Width-3 Joint Sparse Form -- Accelerating Inverse of GF(2 n ) with Precomputation -- Algorithms and Implementations (II) -- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis -- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups -- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables -- Network Security -- Host-Based Security Sensor Integrity in Multiprocessing Environments -- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating -- Rate-Based Watermark Traceback: A New Approach -- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes -- Access Control -- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk -- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), -- Identity Management -- A Trustworthy ID Management Mechanism in Open Market -- BioID: Biometric-Based Identity Management -- Trust Management -- Privacy Preserving of Trust Management Credentials Based on Trusted Computing -- Mitigating the Malicious Trust Expansion in Social Network Service -- Public Key Cryptography -- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification -- Certificateless KEM and Hybrid Signcryption Schemes Revisited -- A Deniable Group Key Establishment Protocol in the Standard Model -- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting -- Security Applications -- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis -- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles -- Attacking and Improving on Lee and Chiu’s Authentication Scheme Using Smart Cards -- Protection Profile for Secure E-Voting Systems.
520 _aThis book constitutes the proceedings of the 6th International Conference on Information Security Practice and Experience, ISPEC 2010, held in Seoul, Korea, in May 2010. The 28 papers presented in this volume were carefully reviewed and selected from 91 submissions. They are grouped in sections on cryptanalysis, algorithms and implementations, network security, access control, identity management, trust management, public key cryptography, and security applications.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Encryption.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aComputers and Society.
650 2 4 _aSystems and Data Security.
700 1 _aDeng, Robert H.
_eeditor.
700 1 _aWon, Yoojae.
_eeditor.
700 1 _aWang, Guilin.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642128264
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6047
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-12827-1
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112146
_d112146