000 | 04716nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-540-33153-7 | ||
003 | DE-He213 | ||
005 | 20240730185048.0 | ||
007 | cr nn 008mamaa | ||
008 | 100302s2006 gw | s |||| 0|eng d | ||
020 |
_a9783540331537 _9978-3-540-33153-7 |
||
024 | 7 |
_a10.1007/11604938 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aInformation Security Applications _h[electronic resource] : _b6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers / _cedited by Jooseok Song, Taekyoung Kwon. |
250 | _a1st ed. 2006. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2006. |
|
300 |
_aXII, 378 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v3786 |
|
505 | 0 | _aSecurity Analysis and Attacks -- Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis -- System Security -- An Alert Data Mining Framework for Network-Based Intrusion Detection System -- Key Factors Influencing Worm Infection in Enterprise Networks -- Evaluation of the Unified Modeling Language for Security Requirements Analysis -- Network Security -- A Simple and Efficient Conference Scheme for Mobile Communications -- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network -- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model -- Elastic Security QoS Provisioning for Telematics Applications -- DRM/Software Security -- An Improved Algorithm to Watermark Numeric Relational Data -- Video Fingerprinting System Using Wavelet and Error Correcting Code -- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels -- Kimchi: A Binary Rewriting Defense Against Format String Attacks -- Software Protection Through Dynamic Code Mutation -- Efficient HW Implementation -- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ) -- Developing and Implementing IHPM on IXP 425 Network Processor Platforms -- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices -- mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors -- Side-Channel Attacks -- Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA -- A DPA Countermeasure by Randomized Frobenius Decomposition -- DPA Attack on the Improved Ha-Moon Algorithm -- An Efficient Masking Scheme for AES SoftwareImplementations -- Privacy/Anonymity -- Secure Multi-attribute Procurement Auction -- Oblivious Conjunctive Keyword Search -- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption -- Efficient Implementation -- New Concept of Authority Range for Flexible Management of Role Hierarchy -- Role-Based Access Control Model for Ubiquitous Computing Environment -- Designing Security Auditing Protocol with Web Browsers. | |
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9137753 |
|
650 | 0 |
_aComputers, Special purpose. _946653 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputer Communication Networks. _9137754 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aSpecial Purpose and Application-Based Systems. _946654 |
700 | 1 |
_aSong, Jooseok. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137755 |
|
700 | 1 |
_aKwon, Taekyoung. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137756 |
|
710 | 2 |
_aSpringerLink (Online service) _9137757 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540310129 |
776 | 0 | 8 |
_iPrinted edition: _z9783540819226 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v3786 _9137758 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/11604938 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92625 _d92625 |