Information security practice and experience : Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007 : proceedings

著者
書誌事項

Information security practice and experience : Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007 : proceedings

Ed Dawson, Duncan S. Wong (eds.)

(Lecture notes in computer science, 4464)

Springer, c2007

この図書・雑誌をさがす
注記

Includes bibliographical references and index

内容説明・目次

内容説明

This book constitutes the refereed proceedings of the Third International Information Security Practice and Experience Conference, ISPEC 2007, held in Hong Kong, China, May 2007. The 24 revised full papers presented with two invited papers cover cryptanalysis, signatures, network security and security management, privacy and applications, cryptographic algorithms and implementations, authentication and key management, as well as cryptosystems.

目次

Invited Talks.- Application Security - Myth Or Reality?.- Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).- Cryptanalysis.- A Linear Analysis of Blowfish and Khufu.- Related-Key Rectangle Attack on 43-Round SHACAL-2.- On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis.- Signatures.- A Sanitizable Signature Scheme with Aggregation.- A Novel Verifiably Encrypted Signature Scheme Without Random Oracle.- Certificate Based (Linkable) Ring Signature.- An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme.- On the Sequentiality of Three Optimal Structured Multisignature Schemes.- Network Security and Security Management.- Secure Feedback Service in Wireless Sensor Networks.- An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.- Practical Uses of Virtual Machines for Protection of Sensitive User Data.- Formalization of RBAC Policy with Object Class Hierarchy.- Privacy and Applications.- Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers.- Two-Party Privacy-Preserving Agglomerative Document Clustering.- Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction.- Cryptographic Algorithms and Implementations.- How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method.- Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices.- Some Efficient Algorithms for the Final Exponentiation of ? T Pairing.- Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems.- Authentication and Key Management.- Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems.- Scalable Group Key Management Protocol Based on Key Material Transmitting Tree.- A Time-Based Key Management Protocol for Wireless Sensor Networks.- Cryptosystems.- Identity-Based Threshold Decryption Revisited.- Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示
詳細情報
  • NII書誌ID(NCID)
    BA81901944
  • ISBN
    • 9783540721598
  • LCCN
    2007924822
  • 出版国コード
    gw
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    Berlin
  • ページ数/冊数
    xiii, 359 p.
  • 大きさ
    24 cm
  • 親書誌ID
ページトップへ