Information Security (Record no. 91526)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06843nam a22006735i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-31930-6 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730182836.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100928s2005 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540319306 |
-- | 978-3-540-31930-6 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/11556992 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Information Security |
Medium | [electronic resource] : |
Remainder of title | 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings / |
Statement of responsibility, etc. | edited by Jianying Zhou, Robert H. Deng, Feng Bao. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2005. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2005. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XII, 520 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 3650 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- "Trust Engineering:" From Requirements to System Design and Maintenance - A Working National Lottery System Experience -- A Privacy Preserving Rental System -- Key Management & Protocols -- Constant Round Dynamic Group Key Agreement -- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design -- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms -- On the Notion of Statistical Security in Simulatability Definitions -- Public Key Encryption & Signature -- Certificateless Public Key Encryption Without Pairing -- Tracing-by-Linking Group Signatures -- Chaum's Designated Confirmer Signature Revisited -- Network Security II -- gore: Routing-Assisted Defense Against DDoS Attacks -- IPSec Support in NAT-PT Scenario for IPv6 Transition -- Signcryption -- Hybrid Signcryption Schemes with Outsider Security -- Analysis and Improvement of a Signcryption Scheme with Key Privacy -- Efficient and Proactive Threshold Signcryption -- Crypto Algorithm & Analysis -- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? -- Hardware Architecture and Cost Estimates for Breaking SHA-1 -- On the Security of Tweakable Modes of Operation: TBC and TAE -- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm -- Cryptography -- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing -- An Oblivious Transfer Protocol with Log-Squared Communication -- Applications -- Electronic Voting: Starting Over? -- Timed-Release Encryption with Pre-open Capabilityand Its Application to Certified E-mail System -- Universally Composable Time-Stamping Schemes with Audit -- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption -- Software Security -- Building a Cryptovirus Using Microsoft's Cryptographic API -- On the Security of the WinRAR Encryption Method -- Towards Better Software Tamper Resistance -- Authorization & Access Control -- Device-Enabled Authorization in the Grey System -- Evaluating Access Control Policies Through Model Checking -- A Cryptographic Solution for General Access Control -- Student Papers -- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting -- A Formal Definition for Trust in Distributed Systems -- A Practical Voting Scheme with Receipts -- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation -- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before - only 33 regular papers were accepted, plus 5 student papers for a special student session. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
9 (RLIN) | 9168 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Operating systems (Computers). |
9 (RLIN) | 5329 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Algorithms. |
9 (RLIN) | 3390 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and civilization. |
9 (RLIN) | 21733 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electronic data processing |
General subdivision | Management. |
9 (RLIN) | 129414 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptology. |
9 (RLIN) | 31769 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Communication Networks. |
9 (RLIN) | 129415 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Operating Systems. |
9 (RLIN) | 37074 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Algorithms. |
9 (RLIN) | 3390 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and Society. |
9 (RLIN) | 31668 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | IT Operations. |
9 (RLIN) | 31703 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Zhou, Jianying. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 129416 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Deng, Robert H. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 129417 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Bao, Feng. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 129418 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 129419 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540290018 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540815822 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 3650 |
9 (RLIN) | 129420 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/11556992">https://doi.org/10.1007/11556992</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.