Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6047 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Cryptanalysis
- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
- Integral Attacks on Reduced-Round ARIA Block Cipher
- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance
- On the Security of NOEKEON against Side Channel Cube Attacks
- Algorithms and Implementations (I)
- On Fast and Approximate Attack Tree Computations
- Width-3 Joint Sparse Form
- Accelerating Inverse of GF(2 n ) with Precomputation
- Algorithms and Implementations (II)
- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis
- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups
- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables
- Network Security
- Host-Based Security Sensor Integrity in Multiprocessing Environments
- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating
- Rate-Based Watermark Traceback: A New Approach
- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes
- Access Control
- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk
- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),
- Identity Management
- A Trustworthy ID Management Mechanism in Open Market
- BioID: Biometric-Based Identity Management
- Trust Management
- Privacy Preserving of Trust Management Credentials Based on Trusted Computing
- Mitigating the Malicious Trust Expansion in Social Network Service
- Public Key Cryptography
- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
- Certificateless KEM and Hybrid Signcryption Schemes Revisited
- A Deniable Group Key Establishment Protocol in the Standard Model
- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting
- Security Applications
- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis
- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
- Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards
- Protection Profile for Secure E-Voting Systems.