libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

won dongho (curatore); kim seungjoo (curatore) - information security and cryptology - icisc 2005
Zoom

Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
54,98 €
NICEPRICE
52,23 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 04/2006
Edizione: 1





Sommario

Invited Talks.- National Security, Forensics and Mobile Communications.- Information Security as Interdisciplinary Science Based on Ethics.- Key Management and Distributed Cryptography.- A Timed-Release Key Management Scheme for Backward Recovery.- Property-Based Broadcast Encryption for Multi-level Security Policies.- Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption.- Authentication and Biometrics.- An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image.- Trust Management for Resilient Wireless Sensor Networks.- Improvements to Mitchell’s Remote User Authentication Protocol.- Efficient Authenticators with Application to Key Exchange.- Provable Security and Primitives.- Benes and Butterfly Schemes Revisited.- Relative Doubling Attack Against Montgomery Ladder.- Improved Collision Attack on MD4 with Probability Almost 1.- Finding Collision on 45-Step HAS-160.- System/Network Security.- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.- The Dilemma of Covert Channels Searching.- A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.- Foundations of Attack Trees.- Block/Stream Ciphers (I).- An Algebraic Masking Method to Protect AES Against Power Attacks.- Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.- Integral Cryptanalysis of Reduced FOX Block Cipher.- Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components.- Block/Stream Ciphers (II).- Cryptanalysis of Sfinks.- Weaknesses of COSvd (2,128) Stream Cipher.- Expanding Weak PRF with Small Key Size.- On Linear Systems of Equations with Distinct Variables and Small Block Size.- Efficient Implementations.- An FPGA Implementation of CCM Mode UsingAES.- New Architecture for Multiplication in GF(2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.- An Efficient Design of CCMP for Robust Security Network.- Digital Rights Management.- Software-Based Copy Protection for Temporal Media During Dissemination and Playback.- Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme.- Public Key Cryptography.- Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.- An Efficient Static Blind Ring Signature Scheme.- Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model.- Yet Another Forward Secure Signature from Bilinear Pairings.










Altre Informazioni

ISBN:

9783540333548

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 233 x 155 mm
Formato: Brossura
Illustration Notes:XIV, 458 p.
Pagine Arabe: 458
Pagine Romane: xiv


Dicono di noi