000 | 04604nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-540-79104-1 | ||
003 | DE-He213 | ||
005 | 20240730181419.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2008 gw | s |||| 0|eng d | ||
020 |
_a9783540791041 _9978-3-540-79104-1 |
||
024 | 7 |
_a10.1007/978-3-540-79104-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security Practice and Experience _h[electronic resource] : _b4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings / _cedited by Liqun Chen, Yi Mu, Willy Susilo. |
250 | _a1st ed. 2008. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2008. |
|
300 |
_aXIII, 420 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v4991 |
|
505 | 0 | _aVerification of Integrity and Secrecy Properties of a Biometric Authentication Protocol -- An On-Line Secure E-Passport Protocol -- Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly -- 1-out-of-n Oblivious Signatures -- A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes -- Private Query on Encrypted Data in Multi-user Settings -- Towards Tamper Resistant Code Encryption: Practice and Experience -- A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme -- RSA Moduli with a Predetermined Portion: Techniques and Applications -- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs -- Secure Cryptographic Precomputation with Insecure Memory -- Securing Peer-to-Peer Distributions for Mobile Devices -- Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks -- Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers -- PROBE: A Process Behavior-Based Host Intrusion Prevention System -- Towards the World-Wide Quantum Network -- Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software -- Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains -- Privacy of Recent RFID Authentication Protocols -- A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection -- An Efficient Countermeasure against Side Channel Attacks for Pairing Computation -- Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic -- Secure Computation of the Vector Dominance Problem -- Rational Secret Sharing with Repeated Games -- Distributed Private Matching and Set Operations -- Computational Soundness ofNon-Malleable Commitments -- Square Attack on Reduced-Round Zodiac Cipher -- Analysis of Zipper as a Hash Function -- On the Importance of the Key Separation Principle for Different Modes of Operation. | |
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9124767 |
|
650 | 0 |
_aInformation storage and retrieval systems. _922213 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9124768 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _923927 |
700 | 1 |
_aChen, Liqun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9124769 |
|
700 | 1 |
_aMu, Yi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9124770 |
|
700 | 1 |
_aSusilo, Willy. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9124771 |
|
710 | 2 |
_aSpringerLink (Online service) _9124772 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540791034 |
776 | 0 | 8 |
_iPrinted edition: _z9783540847878 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v4991 _9124773 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-79104-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90885 _d90885 |