Cargando…

Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings /

The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong Kong, China, May 7 - 9, 2007. The conference was organized and sponsored by City University of Hong Kong. As applications of information security technologies become pervasive, - sues per...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Dawson, Ed (Editor ), Wong, Duncan S. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Security and Cryptology ; 4464
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Talks
  • Application Security - Myth Or Reality?
  • Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
  • Cryptanalysis
  • A Linear Analysis of Blowfish and Khufu
  • Related-Key Rectangle Attack on 43-Round SHACAL-2
  • On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis
  • Signatures
  • A Sanitizable Signature Scheme with Aggregation
  • A Novel Verifiably Encrypted Signature Scheme Without Random Oracle
  • Certificate Based (Linkable) Ring Signature
  • An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme
  • On the Sequentiality of Three Optimal Structured Multisignature Schemes
  • Network Security and Security Management
  • Secure Feedback Service in Wireless Sensor Networks
  • An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
  • Practical Uses of Virtual Machines for Protection of Sensitive User Data
  • Formalization of RBAC Policy with Object Class Hierarchy
  • Privacy and Applications
  • Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
  • Two-Party Privacy-Preserving Agglomerative Document Clustering
  • Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction
  • Cryptographic Algorithms and Implementations
  • How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method
  • Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices
  • Some Efficient Algorithms for the Final Exponentiation of ? T Pairing
  • Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems
  • Authentication and Key Management
  • Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
  • Scalable Group Key Management Protocol Based on Key Material Transmitting Tree
  • A Time-Based Key Management Protocol for Wireless Sensor Networks
  • Cryptosystems
  • Identity-Based Threshold Decryption Revisited
  • Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images.