Information Security and Privacy (eBook, PDF)
13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Redaktion: Mu, Yi; Seberry, Jennifer; Susilo, Willy
Alle Infos zum eBook verschenken
Information Security and Privacy (eBook, PDF)
13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Redaktion: Mu, Yi; Seberry, Jennifer; Susilo, Willy
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.
The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 8.73MB
- Information Security and Privacy (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Progress in Cryptology - VIETCRYPT 2006 (eBook, PDF)40,95 €
- Information Security and Privacy (eBook, PDF)40,95 €
- Progress in Cryptology - INDOCRYPT 2008 (eBook, PDF)40,95 €
- Information Security and Privacy (eBook, PDF)40,95 €
- Information Security and Cryptology - ICISC 2005 (eBook, PDF)40,95 €
-
-
-
The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 480
- Erscheinungstermin: 29. Juni 2008
- Englisch
- ISBN-13: 9783540705000
- Artikelnr.: 44131697
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 480
- Erscheinungstermin: 29. Juni 2008
- Englisch
- ISBN-13: 9783540705000
- Artikelnr.: 44131697
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Enforcing User
Aware Browser
Based Mutual Authentication with Strong Locked Same Origin Policy.
Secure Biometric Authentication with Improved Accuracy.
A Critical Analysis and Improvement of AACS Drive
Host Authentication.
Comparing the Pre
and Post
specified Peer Models for Key Agreement.
Efficient One
Round Key Exchange in the Standard Model.
On the Improvement of the BDF Attack on LSBS
RSA.
Public
Key Cryptosystems with Primitive Power Roots of Unity.
Relationship between Two Approaches for Defining the Standard Model PA
ness.
Distributed Verification of Mixing
Local Forking Proofs Model.
Fully
Simulatable Oblivious Set Transfer.
Efficient Disjointness Tests for Private Datasets.
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
Cryptanalysis of Reduced
Round SMS4 Block Cipher.
On the Unprovable Security of 2
Key XCBC.
Looking Back at a New Hash Function.
Non
linear Reduced Round Attacks against SHA
2 Hash Family.
Collisions for Round
Reduced LAKE.
Preimage Attacks on Step
Reduced MD5.
Linear Distinguishing Attack on Shannon.
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck.
Related
Key Chosen IV Attacks on Grain
v1 and Grain
128.
Signature Generation and Detection of Malware Families.
Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
Implicit Detection of Hidden Processes with a Feather
Weight Hardware
Assisted Virtual Machine Monitor.
FormatShield: A Binary Rewriting Defense against Format String Attacks.
Advanced Permission
Role Relationship in Role
Based Access Control.
Enhancing Micro
Aggregation Technique by Utilizing Dependence
Based Information in Secure Statistical Databases.
Montgomery Residue Representation Fault
Tolerant Computation in GF(2 k ).
A Tree
Based Approach for Computing Double
Base Chains.
Extractors for Jacobians of Binary Genus
2 Hyperelliptic Curves.
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.
Enforcing User
Aware Browser
Based Mutual Authentication with Strong Locked Same Origin Policy.
Secure Biometric Authentication with Improved Accuracy.
A Critical Analysis and Improvement of AACS Drive
Host Authentication.
Comparing the Pre
and Post
specified Peer Models for Key Agreement.
Efficient One
Round Key Exchange in the Standard Model.
On the Improvement of the BDF Attack on LSBS
RSA.
Public
Key Cryptosystems with Primitive Power Roots of Unity.
Relationship between Two Approaches for Defining the Standard Model PA
ness.
Distributed Verification of Mixing
Local Forking Proofs Model.
Fully
Simulatable Oblivious Set Transfer.
Efficient Disjointness Tests for Private Datasets.
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
Cryptanalysis of Reduced
Round SMS4 Block Cipher.
On the Unprovable Security of 2
Key XCBC.
Looking Back at a New Hash Function.
Non
linear Reduced Round Attacks against SHA
2 Hash Family.
Collisions for Round
Reduced LAKE.
Preimage Attacks on Step
Reduced MD5.
Linear Distinguishing Attack on Shannon.
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck.
Related
Key Chosen IV Attacks on Grain
v1 and Grain
128.
Signature Generation and Detection of Malware Families.
Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
Implicit Detection of Hidden Processes with a Feather
Weight Hardware
Assisted Virtual Machine Monitor.
FormatShield: A Binary Rewriting Defense against Format String Attacks.
Advanced Permission
Role Relationship in Role
Based Access Control.
Enhancing Micro
Aggregation Technique by Utilizing Dependence
Based Information in Secure Statistical Databases.
Montgomery Residue Representation Fault
Tolerant Computation in GF(2 k ).
A Tree
Based Approach for Computing Double
Base Chains.
Extractors for Jacobians of Binary Genus
2 Hyperelliptic Curves.
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.