Record ID | marc_columbia/Columbia-extract-20221130-009.mrc:201110255:5224 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-009.mrc:201110255:5224?format=raw |
LEADER: 05224cam a22003858a 4500
001 4192807
005 20221027052839.0
008 031009s2003 nyu b 101 0 eng
010 $a 2003063080
016 7 $a96874866X$2GyFmDB
020 $a3540201769 (alk. paper)
035 $a(OCoLC)ocm53223680
035 $a(NNC)4192807
035 $a4192807
040 $aDLC$cDLC$dOHX$dOrLoB-B
042 $apcc
050 00 $aQA76.9.A25$bI85 2003
072 7 $aQA$2lcco
082 00 $a005.8$222
111 2 $aISC (Conference : Information security)$n(6th :$d2003 :$cBristol, England)$0http://id.loc.gov/authorities/names/n2003014804
245 10 $aInformation security :$b6th international conference, ISC 2003, Bristol, UK, October 1-3, 2003 : proceedings /$cColin Boyd, Wenbo Mao (eds.)
260 $aNew York :$bSpringer-Verlag,$c2003.
263 $a0310
300 $axi, 441 pages :$billustrations ;$c24 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
490 1 $aLecture notes in computer science ;$v2851
504 $aIncludes bibliographical references and index.
505 00 $tRevisiting Software Protection /$rPaul C. van Oorschot -- $tEnabling Shared Audit Data /$rAdrian Baldwin and Simon Shiu -- $tCryptographically Generated Addresses (CGA) /$rTuomas Aura -- $tValidating and Securing Spontaneous Associations between Wireless Devices /$rTim Kindberg and Kan Zhang -- $tSingle Sign-On Using Trusted Platforms /$rAndreas Pashalidis and Chris J. Mitchell -- $tEasy Verifiable Primitives and Practical Public Key Cryptosystems /$rDavid Galindo, Sebastia Martin, Paz Morillo and Jorge L. Villar -- $tReactively Secure Signature Schemes /$rMichael Backes, Birgit Pfitzmann and Michael Waidner -- $tValidating Digital Signatures without TTP's Time-Stamping and Certificate Revocation /$rJianying Zhou, Feng Bao and Robert Deng -- $tA Fast Signature Scheme Based on New On-line Computation /$rTakeshi Okamoto, Hirofumi Katsuno and Eiji Okamoto -- $tDistributed RSA Signature Schemes for General Access Structures /$rJavier Herranz, Carles Padro and German Saez -- $tDivisible Voting Scheme /$rNatsuki Ishida, Shin'ichiro Matsuo and Wakaha Ogata -- $tUnconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations /$rAnderson C. A. Nascimento, Joern Mueller-Quade, Akira Otsuka, Goichiro Hanaoka and Hideki Imai -- $tThe Design and Implementation of Protocol-Based Hidden Key Recovery /$rEu-Jin Goh, Dan Boneh, Benny Pinkas and Philippe Golle -- $tIntrinsic Limitations of Digital Signatures and How to Cope with Them /$rUeli Maurer -- $tOn the Security of Fair Non-repudiation Protocols /$rSigrid Gurgens, Carsten Rudolph and Holger Vogt -- $tSecurity Analysis of a Password Authenticated Key Exchange Protocol /$rFeng Bao -- $tZero-Value Point Attacks on Elliptic Curve Cryptosystem /$rToru Akishita and Tsuyoshi Takagi -- $tCryptanalysis of an Algebraic Privacy Homomorphism /$rDavid Wagner -- $tAnalysis of the Insecurity of ECMQV with Partially Known Nonces /$rPeter J. Leadbitter and Nigel P. Smart -- $tHardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES /$rAkashi Satoh and Sumio Morioka -- $tA Note on Weak Keys of PES, IDEA, and Some Extended Variants /$rJorge Nakahara, Jr., Bart Preneel and Joos Vandewalle -- $tFoundations of Differential Cryptanalysis in Abelian Groups /$rTomasz Tyksinski -- $tTrust and Authorization in Pervasive B2E Scenarios /$rLaurent Bussard, Yves Roudier, Roger Kilian-Kehr and Stefano Crosta -- $tA Logic Model for Temporal Authorization Delegation with Negation /$rChun Ruan, Vijay Varadharajan and Yan Zhang -- $tZero-Distortion Authentication Watermarking /$rYongdong Wu -- $tDesignated Verification of Non-invertible Watermark /$rHyejoung Yoo, Hyungwoo Lee, Sangjin Lee and Jongin Lim -- $tProactive Software Tampering Detection /$rHongxia Jin and Jeffery Lotspiech -- $tRun-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits /$rPramod Ramarao, Akhilesh Tyagi and Gyungho Lee -- $tTowards a Business Process-Driven Framework for Security Engineering with the UML /$rJose L. Vivas, Jose A. Montenegro and Javier Lopez -- $tError Correcting and Complexity Aspects of Linear Secret Sharing Schemes /$rYvo Desmedt, Kaoru Kurosawa and Tri Van Le -- $tSystematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations /$rKatsunari Yoshioka, Junji Shikata and Tsutomu Matsumoto -- $tShort c-Secure Fingerprinting Codes /$rTri Van Le, Mike Burmester and Jiangyi Hu -- $tThe Role of Arbiters in Asymmetric Authentication Schemes /$rGoichiro Hanaoka, Junji Shikata, Yumiko Hanaoka and Hideki Imai.
650 0 $aComputer security$vCongresses.$0http://id.loc.gov/authorities/subjects/sh2008101458
650 0 $aComputers$xAccess control$vCongresses.$0http://id.loc.gov/authorities/subjects/sh2007008440
700 1 $aBoyd, Colin.$0http://id.loc.gov/authorities/names/nb2004008774
700 1 $aMao, Wenbo.$0http://id.loc.gov/authorities/names/n2003014803
830 0 $aLecture notes in computer science ;$v2851.$0http://id.loc.gov/authorities/names/n42015162
852 00 $boff,eng$hQA76.9.A25$iI85 2003