|
|
|
|
LEADER |
03591nmm a2200445 u 4500 |
001 |
EB000380522 |
003 |
EBX01000000000000000233574 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783540791041
|
100 |
1 |
|
|a Chen, Liqun
|e [editor]
|
245 |
0 |
0 |
|a Information Security Practice and Experience
|h Elektronische Ressource
|b 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
|c edited by Liqun Chen, Yi Mu, Willy Susilo
|
250 |
|
|
|a 1st ed. 2008
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2008, 2008
|
300 |
|
|
|a XIII, 420 p
|b online resource
|
505 |
0 |
|
|a Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol -- An On-Line Secure E-Passport Protocol -- Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly -- 1-out-of-n Oblivious Signatures -- A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes -- Private Query on Encrypted Data in Multi-user Settings -- Towards Tamper Resistant Code Encryption: Practice and Experience -- A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh’s HIBE Scheme -- RSA Moduli with a Predetermined Portion: Techniques and Applications -- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs -- Secure Cryptographic Precomputation with Insecure Memory -- Securing Peer-to-Peer Distributions for Mobile Devices -- Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks --
|
505 |
0 |
|
|a On the Importance of the Key Separation Principle for Different Modes of Operation
|
505 |
0 |
|
|a Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers -- PROBE: A Process Behavior-Based Host Intrusion Prevention System -- Towards the World-Wide Quantum Network -- Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software -- Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains -- Privacy of Recent RFID Authentication Protocols -- A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection -- An Efficient Countermeasure against Side Channel Attacks for Pairing Computation -- Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic -- Secure Computation of the Vector Dominance Problem -- Rational Secret Sharing with Repeated Games -- Distributed Private Matching and Set Operations -- Computational Soundness ofNon-Malleable Commitments -- Square Attack on Reduced-Round Zodiac Cipher -- Analysis of Zipper as a Hash Function --
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Information Storage and Retrieval
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Information storage and retrieval systems
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a IT Operations
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Mu, Yi
|e [editor]
|
700 |
1 |
|
|a Susilo, Willy
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-540-79104-1
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-540-79104-1?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|