Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings /
The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong Kong, China, May 7 - 9, 2007. The conference was organized and sponsored by City University of Hong Kong. As applications of information security technologies become pervasive, - sues per...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Security and Cryptology ;
4464 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Talks
- Application Security - Myth Or Reality?
- Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
- Cryptanalysis
- A Linear Analysis of Blowfish and Khufu
- Related-Key Rectangle Attack on 43-Round SHACAL-2
- On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis
- Signatures
- A Sanitizable Signature Scheme with Aggregation
- A Novel Verifiably Encrypted Signature Scheme Without Random Oracle
- Certificate Based (Linkable) Ring Signature
- An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme
- On the Sequentiality of Three Optimal Structured Multisignature Schemes
- Network Security and Security Management
- Secure Feedback Service in Wireless Sensor Networks
- An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
- Practical Uses of Virtual Machines for Protection of Sensitive User Data
- Formalization of RBAC Policy with Object Class Hierarchy
- Privacy and Applications
- Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
- Two-Party Privacy-Preserving Agglomerative Document Clustering
- Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction
- Cryptographic Algorithms and Implementations
- How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method
- Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices
- Some Efficient Algorithms for the Final Exponentiation of ? T Pairing
- Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems
- Authentication and Key Management
- Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
- Scalable Group Key Management Protocol Based on Key Material Transmitting Tree
- A Time-Based Key Management Protocol for Wireless Sensor Networks
- Cryptosystems
- Identity-Based Threshold Decryption Revisited
- Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images.