Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings /
The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong Kong, China, May 7 – 9, 2007. The conference was organized and sponsored by City University of Hong Kong. As applications of information security technologies become pervasive, - sues per...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4464 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talks
- Application Security – Myth Or Reality?
- Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
- Cryptanalysis
- A Linear Analysis of Blowfish and Khufu
- Related-Key Rectangle Attack on 43-Round SHACAL-2
- On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis
- Signatures
- A Sanitizable Signature Scheme with Aggregation
- A Novel Verifiably Encrypted Signature Scheme Without Random Oracle
- Certificate Based (Linkable) Ring Signature
- An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess’s Scheme
- On the Sequentiality of Three Optimal Structured Multisignature Schemes
- Network Security and Security Management
- Secure Feedback Service in Wireless Sensor Networks
- An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
- Practical Uses of Virtual Machines for Protection of Sensitive User Data
- Formalization of RBAC Policy with Object Class Hierarchy
- Privacy and Applications
- Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
- Two-Party Privacy-Preserving Agglomerative Document Clustering
- Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction
- Cryptographic Algorithms and Implementations
- How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication – Ring Extension Method
- Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices
- Some Efficient Algorithms for the Final Exponentiation of ? T Pairing
- Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems
- Authentication and Key Management
- Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
- Scalable Group Key Management Protocol Based on Key Material Transmitting Tree
- A Time-Based Key Management Protocol for Wireless Sensor Networks
- Cryptosystems
- Identity-Based Threshold Decryption Revisited
- Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images.