Min Surp Rhee / Byoungcheon Lee (eds.)
Information Security and Cryptology ¿ ICISC 2006
9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings
Herausgegeben:Rhee, Min Surp; Lee, Byoungcheon
Min Surp Rhee / Byoungcheon Lee (eds.)
Information Security and Cryptology ¿ ICISC 2006
9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings
Herausgegeben:Rhee, Min Surp; Lee, Byoungcheon
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006. The 26 revised full papers cover such topics as hash functions, block and stream ciphers, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures.
Andere Kunden interessierten sich auch für
- WonInformation Security and Cryptology - ICISC 200542,99 €
- LeeInformation Security and Cryptology - ICISC 200242,99 €
- Pil Joong Lee / Jung Hee Cheon (Volume editor)Information Security and Cryptoloy - ICISC 200837,99 €
- Phong Q. Nguyen (ed.)Progress in Cryptology - VIETCRYPT 200642,99 €
- Kil-Hyun Nam (Volume ed.) / Gwangsoo RheeInformation Security and Cryptology - ICISC 200742,99 €
- Tal Malkin (Volume ed.)Topics in Cryptology ¿ CT-RSA 200842,99 €
- Masayuki AbeTopics in Cryptology ¿ CT-RSA 200742,99 €
-
-
-
This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006. The 26 revised full papers cover such topics as hash functions, block and stream ciphers, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 4296
- Verlag: Springer, Berlin
- Artikelnr. des Verlages: 11927587
- 2006
- Seitenzahl: 376
- Erscheinungstermin: 14. November 2006
- Englisch
- Abmessung: 235mm x 155mm x 21mm
- Gewicht: 575g
- ISBN-13: 9783540491125
- ISBN-10: 3540491120
- Artikelnr.: 20946575
- Lecture Notes in Computer Science 4296
- Verlag: Springer, Berlin
- Artikelnr. des Verlages: 11927587
- 2006
- Seitenzahl: 376
- Erscheinungstermin: 14. November 2006
- Englisch
- Abmessung: 235mm x 155mm x 21mm
- Gewicht: 575g
- ISBN-13: 9783540491125
- ISBN-10: 3540491120
- Artikelnr.: 20946575
Min Surp Rhee, Dankook University, Korea / Byoungcheon Lee, Joongbu University, Korea
Invited Talks.- RFID Privacy Based on Public-Key Cryptography.- Generic Attacks on Symmetric Ciphers.- Hash Functions - I.- Improved Collision Attack on the Hash Function Proposed at PKC'98.- Hashing with Polynomials.- Birthday Paradox for Multi-collisions.- Block and Stream Ciphers.- New Variant of the Self-Shrinking Generator and Its Cryptographic Properties.- On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher.- On Algebraic Immunity and Annihilators.- Efficient Implementation and Hardware.- High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem.- A High-Speed Square Root Algorithm in Extension Fields.- The Smallest ARIA Module with 16-Bit Architecture.- A Simpler Sieving Device: Combining ECM and TWIRL.- Network Security and Access Control.- Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks.- A Time-Frame Based Trust Model for P2P Systems.- Spatial Context in Role-Based Access Control.- Mobile Communications Security.- An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks.- Mobile RFID Applications and Security Challenges.- Forensics.- An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time.- Copyright Protection.- A Copy Protection Technique Using Multi-level Error Coding.- Digital Rights Management with Right Delegation for Home Networks.- Biometrics.- Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM.- Hash Functions - II.- Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction.- Cryptanalysis of T-Function-Based Hash Functions.- Collision Search Attack for 53-Step HAS-160.- Public Key Cryptosystems.- Klein BottleRouting: An Alternative to Onion Routing and Mix Network.- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle.- Digital Signatures.- A New Proxy Signature Scheme Providing Self-delegation.- Extended Sanitizable Signatures.
Invited Talks.- RFID Privacy Based on Public-Key Cryptography.- Generic Attacks on Symmetric Ciphers.- Hash Functions - I.- Improved Collision Attack on the Hash Function Proposed at PKC'98.- Hashing with Polynomials.- Birthday Paradox for Multi-collisions.- Block and Stream Ciphers.- New Variant of the Self-Shrinking Generator and Its Cryptographic Properties.- On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher.- On Algebraic Immunity and Annihilators.- Efficient Implementation and Hardware.- High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem.- A High-Speed Square Root Algorithm in Extension Fields.- The Smallest ARIA Module with 16-Bit Architecture.- A Simpler Sieving Device: Combining ECM and TWIRL.- Network Security and Access Control.- Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks.- A Time-Frame Based Trust Model for P2P Systems.- Spatial Context in Role-Based Access Control.- Mobile Communications Security.- An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks.- Mobile RFID Applications and Security Challenges.- Forensics.- An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time.- Copyright Protection.- A Copy Protection Technique Using Multi-level Error Coding.- Digital Rights Management with Right Delegation for Home Networks.- Biometrics.- Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM.- Hash Functions - II.- Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction.- Cryptanalysis of T-Function-Based Hash Functions.- Collision Search Attack for 53-Step HAS-160.- Public Key Cryptosystems.- Klein BottleRouting: An Alternative to Onion Routing and Mix Network.- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle.- Digital Signatures.- A New Proxy Signature Scheme Providing Self-delegation.- Extended Sanitizable Signatures.