000 04604nam a22006615i 4500
001 978-3-540-79104-1
003 DE-He213
005 20240730181419.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 _a9783540791041
_9978-3-540-79104-1
024 7 _a10.1007/978-3-540-79104-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInformation Security Practice and Experience
_h[electronic resource] :
_b4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
_cedited by Liqun Chen, Yi Mu, Willy Susilo.
250 _a1st ed. 2008.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2008.
300 _aXIII, 420 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4991
505 0 _aVerification of Integrity and Secrecy Properties of a Biometric Authentication Protocol -- An On-Line Secure E-Passport Protocol -- Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly -- 1-out-of-n Oblivious Signatures -- A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes -- Private Query on Encrypted Data in Multi-user Settings -- Towards Tamper Resistant Code Encryption: Practice and Experience -- A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme -- RSA Moduli with a Predetermined Portion: Techniques and Applications -- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs -- Secure Cryptographic Precomputation with Insecure Memory -- Securing Peer-to-Peer Distributions for Mobile Devices -- Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks -- Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers -- PROBE: A Process Behavior-Based Host Intrusion Prevention System -- Towards the World-Wide Quantum Network -- Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software -- Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains -- Privacy of Recent RFID Authentication Protocols -- A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection -- An Efficient Countermeasure against Side Channel Attacks for Pairing Computation -- Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic -- Secure Computation of the Vector Dominance Problem -- Rational Secret Sharing with Repeated Games -- Distributed Private Matching and Set Operations -- Computational Soundness ofNon-Malleable Commitments -- Square Attack on Reduced-Round Zodiac Cipher -- Analysis of Zipper as a Hash Function -- On the Importance of the Key Separation Principle for Different Modes of Operation.
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9124767
650 0 _aInformation storage and retrieval systems.
_922213
650 1 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9124768
650 2 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
650 2 4 _aInformation Storage and Retrieval.
_923927
700 1 _aChen, Liqun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9124769
700 1 _aMu, Yi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9124770
700 1 _aSusilo, Willy.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9124771
710 2 _aSpringerLink (Online service)
_9124772
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540791034
776 0 8 _iPrinted edition:
_z9783540847878
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4991
_9124773
856 4 0 _uhttps://doi.org/10.1007/978-3-540-79104-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90885
_d90885