
Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings
000 | 01705camuu2200433 a 4500 | |
001 | 000045561074 | |
005 | 20091123145935 | |
008 | 091123s2008 gw a b 101 0 eng d | |
010 | ▼a 2008930081 | |
016 | 7 | ▼a 989061620 ▼2 GyFmDB |
020 | ▼a 9783540699712 (pbk. : alk. paper) | |
020 | ▼a 3540699716 (pbk. : alk. paper) | |
029 | 0 | ▼a OHX ▼b har080100969 |
035 | ▼a (OCoLC)ocm233544543 | |
035 | ▼a (OCoLC)233544543 | |
035 | ▼a (NNC)6800252 | |
040 | ▼a OHX ▼c OHX ▼d BTCTA ▼d LUU ▼d 211009 | |
050 | 1 4 | ▼a QA76.9.A25 ▼b A279 2008 |
072 | 7 | ▼a QA ▼2 lcco |
082 | 0 4 | ▼a 005.8 ▼2 22 |
090 | ▼a 005.8 ▼b A181i ▼c 2008 | |
111 | 2 | ▼a ACISP 2008 ▼d (2008 : ▼c Wollongong, N.S.W.) |
245 | 1 0 | ▼a Information security and privacy : ▼b 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings / ▼c Yi Mu, Willy Susilo, Jennifer Seberry (eds.). |
246 | 3 0 | ▼a ACISP 2008 |
260 | ▼a Berlin ; ▼a New York : ▼b Springer , ▼c c2008. | |
300 | ▼a xiii, 480 p. : ▼b ill. ; ▼c 24 cm. | |
490 | 1 | ▼a Lecture notes in computer science , ▼x 0302-9743 ; ▼v 5107 |
490 | 1 | ▼a LNCS sublibrary. SL 4, Security and cryptology |
504 | ▼a Includes bibliographical references and author index. | |
650 | 0 | ▼a Computers ▼x Access control ▼v Congresses. |
650 | 0 | ▼a Computer security ▼v Congresses. |
650 | 0 | ▼a Data protection ▼v Congresses. |
700 | 1 | ▼a Mu, Yi , ▼d 1955- |
700 | 1 | ▼a Susilo, Willy. |
700 | 1 | ▼a Seberry, Jennifer , ▼d 1944- |
830 | 0 | ▼a Lecture notes in computer science ; ▼v 5107. |
830 | 0 | ▼a LNCS sublibrary. ▼n SL 4, ▼p Security and cryptology. |
945 | ▼a KINS |
소장정보
No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
---|---|---|---|---|---|---|---|
No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 A181i 2008 | 등록번호 121186472 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
목차
New Paradigms for Password Security.- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.- Secure Biometric Authentication with Improved Accuracy.- A Critical Analysis and Improvement of AACS Drive-Host Authentication.- Comparing the Pre- and Post-specified Peer Models for Key Agreement.- Efficient One-Round Key Exchange in the Standard Model.- On the Improvement of the BDF Attack on LSBS-RSA.- Public-Key Cryptosystems with Primitive Power Roots of Unity.- Relationship between Two Approaches for Defining the Standard Model PA-ness.- Distributed Verification of Mixing - Local Forking Proofs Model.- Fully-Simulatable Oblivious Set Transfer.- Efficient Disjointness Tests for Private Datasets.- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.- Multidimensional Linear Cryptanalysis of Reduced Round Serpent.- Cryptanalysis of Reduced-Round SMS4 Block Cipher.- On the Unprovable Security of 2-Key XCBC.- Looking Back at a New Hash Function.- Non-linear Reduced Round Attacks against SHA-2 Hash Family.- Collisions for Round-Reduced LAKE.- Preimage Attacks on Step-Reduced MD5.- Linear Distinguishing Attack on Shannon.- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck.- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128.- Signature Generation and Detection of Malware Families.- Reducing Payload Scans for Attack Signature Matching Using Rule Classification.- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor.- FormatShield: A Binary Rewriting Defense against Format String Attacks.- Advanced Permission-Role Relationship in Role-Based Access Control.- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases.- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ).- A Tree-Based Approach for Computing Double-Base Chains.- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves.- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.
정보제공 :
