|
|
|
|
LEADER |
04300nmm a2200433 u 4500 |
001 |
EB000652505 |
003 |
EBX01000000000000001348939 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
140122 ||| eng |
020 |
|
|
|a 9783540301912
|
100 |
1 |
|
|a López, Javier
|e [editor]
|
245 |
0 |
0 |
|a Information and Communications Security
|h Elektronische Ressource
|b 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings
|c edited by Javier López, Eiji Okamoto
|
250 |
|
|
|a 1st ed. 2004
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2004, 2004
|
300 |
|
|
|a XII, 572 p
|b online resource
|
505 |
0 |
|
|a A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub InfrastructureConcept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) --
|
505 |
0 |
|
|a Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems
|
505 |
0 |
|
|a On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries --
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Operating Systems
|
653 |
|
|
|a Computer science / Mathematics
|
653 |
|
|
|a Discrete Mathematics in Computer Science
|
653 |
|
|
|a Operating systems (Computers)
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Discrete mathematics
|
653 |
|
|
|a IT Operations
|
700 |
1 |
|
|a Okamoto, Eiji
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b SBA
|a Springer Book Archives -2004
|
490 |
0 |
|
|a Lecture Notes in Computer Science
|
028 |
5 |
0 |
|a 10.1007/b101042
|
856 |
4 |
0 |
|u https://doi.org/10.1007/b101042?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|