Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Kwak, Jin (Επιμελητής έκδοσης), Deng, Robert H. (Επιμελητής έκδοσης), Won, Yoojae (Επιμελητής έκδοσης), Wang, Guilin (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6047
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptanalysis
  • Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
  • Integral Attacks on Reduced-Round ARIA Block Cipher
  • A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance
  • On the Security of NOEKEON against Side Channel Cube Attacks
  • Algorithms and Implementations (I)
  • On Fast and Approximate Attack Tree Computations
  • Width-3 Joint Sparse Form
  • Accelerating Inverse of GF(2 n ) with Precomputation
  • Algorithms and Implementations (II)
  • Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis
  • The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups
  • A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables
  • Network Security
  • Host-Based Security Sensor Integrity in Multiprocessing Environments
  • Using Purpose Capturing Signatures to Defeat Computer Virus Mutating
  • Rate-Based Watermark Traceback: A New Approach
  • Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes
  • Access Control
  • Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk
  • A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),
  • Identity Management
  • A Trustworthy ID Management Mechanism in Open Market
  • BioID: Biometric-Based Identity Management
  • Trust Management
  • Privacy Preserving of Trust Management Credentials Based on Trusted Computing
  • Mitigating the Malicious Trust Expansion in Social Network Service
  • Public Key Cryptography
  • An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
  • Certificateless KEM and Hybrid Signcryption Schemes Revisited
  • A Deniable Group Key Establishment Protocol in the Standard Model
  • Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting
  • Security Applications
  • Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis
  • Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
  • Attacking and Improving on Lee and Chiu’s Authentication Scheme Using Smart Cards
  • Protection Profile for Secure E-Voting Systems.