000 | 06610nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-540-31815-6 | ||
003 | DE-He213 | ||
005 | 20240730200312.0 | ||
007 | cr nn 008mamaa | ||
008 | 100630s2005 gw | s |||| 0|eng d | ||
020 |
_a9783540318156 _9978-3-540-31815-6 |
||
024 | 7 |
_a10.1007/b103174 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aInformation Security Applications _h[electronic resource] : _b5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers / _cedited by Chae Hoon Lim, Moti Yung. |
250 | _a1st ed. 2005. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2005. |
|
300 |
_aXII, 474 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v3325 |
|
505 | 0 | _aNetwork/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Encryption with Conjunctive Field Keyword Search -- Intrusion Detection I -- A Probabilistic Method for Detecting Anomalous Program Behavior -- Service Discrimination and Audit File Reduction for Effective Intrusion Detection -- IDS False Alarm Filtering Using KNN Classifier -- Watermarking/Anti-spamming -- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking -- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment -- Public Key Schemes II -- Efficient Authenticated Key Agreement Protocol for Dynamic Groups -- A Ring Signature Scheme Using Bilinear Pairings -- Verifiable Pairing and Its Applications -- Intrusion Detection II -- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading -- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks -- Application of Content Computing in Honeyfarm -- Digital Rights Management -- License Protection with a Tamper-Resistant Token -- An Adaptive Approach to Hardware Alteration for Digital Rights Management -- Dynamic Fingerprinting over Broadcast Using Revocation Scheme -- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels -- e-Commerce Security -- Vulnerability of a Mobile Payment System Proposed at WISA 2002 -- Fair Offline Payment Using Verifiable Encryption -- A Limited-Used Key Generation Scheme for Internet Transactions -- Efficient Implementation -- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes -- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II -- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors -- Hyperelliptic Curve Coprocessors on a FPGA -- Anonymous Communication -- Key-Exchange Protocol Using Pre-agreed Session-ID -- A New k-Anonymous Message Transmission Protocol -- Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack -- Side-Channel Attacks -- Side Channel Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template Attacks -- Evaluation and Improvement of the Tempest Fonts. | |
520 | _aThe 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does 'Security' mean for Ubiquitous Applications?, respectively. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9162795 |
|
650 | 0 |
_aComputers, Special purpose. _946653 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputer Communication Networks. _9162796 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aSpecial Purpose and Application-Based Systems. _946654 |
700 | 1 |
_aLim, Chae Hoon. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9162797 |
|
700 | 1 |
_aYung, Moti. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9162798 |
|
710 | 2 |
_aSpringerLink (Online service) _9162799 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540240150 |
776 | 0 | 8 |
_iPrinted edition: _z9783540805762 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v3325 _9162800 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/b103174 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95980 _d95980 |