Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings /

The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong Kong, China, May 7 – 9, 2007. The conference was organized and sponsored by City University of Hong Kong. As applications of information security technologies become pervasive, - sues per...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Dawson, Ed (Επιμελητής έκδοσης), Wong, Duncan S. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4464
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talks
  • Application Security – Myth Or Reality?
  • Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
  • Cryptanalysis
  • A Linear Analysis of Blowfish and Khufu
  • Related-Key Rectangle Attack on 43-Round SHACAL-2
  • On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis
  • Signatures
  • A Sanitizable Signature Scheme with Aggregation
  • A Novel Verifiably Encrypted Signature Scheme Without Random Oracle
  • Certificate Based (Linkable) Ring Signature
  • An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess’s Scheme
  • On the Sequentiality of Three Optimal Structured Multisignature Schemes
  • Network Security and Security Management
  • Secure Feedback Service in Wireless Sensor Networks
  • An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
  • Practical Uses of Virtual Machines for Protection of Sensitive User Data
  • Formalization of RBAC Policy with Object Class Hierarchy
  • Privacy and Applications
  • Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
  • Two-Party Privacy-Preserving Agglomerative Document Clustering
  • Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction
  • Cryptographic Algorithms and Implementations
  • How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication – Ring Extension Method
  • Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices
  • Some Efficient Algorithms for the Final Exponentiation of ? T Pairing
  • Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems
  • Authentication and Key Management
  • Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
  • Scalable Group Key Management Protocol Based on Key Material Transmitting Tree
  • A Time-Based Key Management Protocol for Wireless Sensor Networks
  • Cryptosystems
  • Identity-Based Threshold Decryption Revisited
  • Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images.