HOME > 상세정보

상세정보

Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings

Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings

자료유형
단행본
개인저자
Batten, Lynn Margaret. Safavi-Naini, Reihanah.
서명 / 저자사항
Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings / Lynn Margaret Batten, Reihaneh Safavi-Naini (eds.).
발행사항
Berlin ;   New York :   Springer,   c2006.  
형태사항
xii, 446 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 4058
ISBN
3540354581 (pbk. : alk. paper) 9783540354581 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computers -- Access control -- Congresses. Computer security -- Congresses. Data protection -- Congresses.
000 01836camuu2200433 a 4500
001 000045560703
005 20091119165905
008 060515s2006 gw a b 101 0 eng d
010 ▼a 2006927435
020 ▼a 3540354581 (pbk. : alk. paper)
020 ▼a 9783540354581 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm70249519
035 ▼a (OCoLC)70249519
035 ▼a (CStRLIN)NYCGQ5689884-B
035 ▼a (NNC)NYCG5689884
035 ▼a (KERIS)REF000012797388
040 ▼a OKU ▼c OKU ▼d NNC ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A25 ▼b A279 2006
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 2006
111 2 ▼a ACISP 2006 ▼d (2006 : ▼c Melbourne, Vic.)
245 1 0 ▼a Information security and privacy : ▼b 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings / ▼c Lynn Margaret Batten, Reihaneh Safavi-Naini (eds.).
246 3 0 ▼a ACISP 2006
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2006.
300 ▼a xii, 446 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4058
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computers ▼x Access control ▼v Congresses.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
700 1 ▼a Batten, Lynn Margaret.
700 1 ▼a Safavi-Naini, Reihanah.
830 0 ▼a Lecture notes in computer science ; ▼v 4058.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A181i 2006 등록번호 121186597 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Stream Ciphers.- Algebraic Attacks on Clock-Controlled Stream Ciphers.- Cache Based Power Analysis Attacks on AES.- Distinguishing Attack on SOBER-128 with Linear Masking.- Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks.- Symmetric Key Ciphers.- Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond.- Improved Cryptanalysis of MAG.- On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions.- Network Security.- Augmented Certificate Revocation Lists.- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.- Towards an Invisible Honeypot Monitoring System.- Cryptographic Applications.- Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.- Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages.- More on Stand-Alone and Setup-Free Verifiably Committed Signatures.- Secure Implementation.- API Monitoring System for Defeating Worms and Exploits in MS-Windows System.- Hiding Circuit Topology from Unbounded Reverse Engineers.- The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications.- Signatures.- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption.- Efficient Identity-Based Signatures Secure in the Standard Model.- Event-Oriented k-Times Revocable-iff-Linked Group Signatures.- Key Replacement Attack Against a Generic Construction of Certificateless Signature.- Theory.- A Novel Range Test.- Efficient Primitives from Exponentiation in ? p .- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity.- Statistical Decoding Revisited.- Invited Talk.- Towards Provable Security for Ubiquitous Applications.- Security Applications.- Oblivious Scalar-Product Protocols.- On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases.- Provable Security.- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles.- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.- Tag-KEM from Set Partial Domain One-Way Permutations.- Protocols.- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.- Graphical Representation of Authorization Policies for Weighted Credentials.- Secure Cross-Realm C2C-PAKE Protocol.- Hashing and Message Authentication.- Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction.- Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions.


정보제공 : Aladin

관련분야 신착자료