Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings (Lecture Notes in Computer Science, 4991) 🔍
A. Salaiwarakul, M. D. Ryan (auth.), Liqun Chen, Yi Mu, Willy Susilo (eds.) Springer-Verlag Berlin Heidelberg, Lecture Notes in Computer Science, Lecture Notes in Computer Science 4991, 1, 2008
英语 [en] · PDF · 6.5MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
描述
This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008.
The 29 revised full papers were carefully reviewed and selected from 95 submissions. The papers cover a wide range of topics in mathematics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve based security practice, security computation and so forth.
备用文件名
lgrsnf/Cs_Computer science/CsLn_Lecture notes/I/Information Security Practice and Experience, 4 conf., ISPEC 2008(LNCS4991, Springer, 2008)(ISBN 9783540791034)(430s).pdf
备用文件名
nexusstc/Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings/aa87bd713925110df3acfac765396ccf.pdf
备用文件名
scihub/10.1007/978-3-540-79104-1.pdf
备用文件名
zlib/Computers/Networking/A. Salaiwarakul, M. D. Ryan (auth.), Liqun Chen, Yi Mu, Willy Susilo (eds.)/Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings_774314.pdf
备选作者
Liqun Chen; ISPEC; Information Security Practice and Experience Conference
备选作者
ISPEC 2008 (2008 Sydney, N.S.W.)
备用出版商
Springer Spektrum. in Springer-Verlag GmbH
备用出版商
Steinkopff. in Springer-Verlag GmbH
备用出版商
Springer London, Limited
备用版本
Lecture notes in computer science -- 4991, LNCS sublibrary, Berlin, New York, Germany, 2008
备用版本
Lecture Notes in Computer Science 4991 : Security and Cryptology, 1, 2008
备用版本
Lecture notes in computer science, 4991, Berlin, Heidelberg, 2008
备用版本
Springer Nature, Berlin, Heidelberg, 2008
备用版本
Germany, Germany
元数据中的注释
Kolxo3 -- 2011
元数据中的注释
sm26285594
元数据中的注释
{"container_title":"Lecture Notes in Computer Science","edition":"1","isbns":["3540791035","3540791043","9783540791034","9783540791041"],"issns":["0302-9743","1611-3349"],"last_page":420,"publisher":"Springer","series":"Lecture Notes in Computer Science 4991"}
元数据中的注释
Includes bibliographical references and index.
Also issued online.
备用描述
Front Matter....Pages -
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol....Pages 1-13
An On-Line Secure E-Passport Protocol....Pages 14-28
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly....Pages 29-44
1-out-of- n Oblivious Signatures....Pages 45-55
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes....Pages 56-70
Private Query on Encrypted Data in Multi-user Settings....Pages 71-85
Towards Tamper Resistant Code Encryption: Practice and Experience....Pages 86-100
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh’s HIBE Scheme....Pages 101-115
RSA Moduli with a Predetermined Portion: Techniques and Applications....Pages 116-130
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs....Pages 131-145
Secure Cryptographic Precomputation with Insecure Memory....Pages 146-160
Securing Peer-to-Peer Distributions for Mobile Devices....Pages 161-175
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks....Pages 176-187
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers....Pages 188-202
PROBE: A Process Behavior-Based Host Intrusion Prevention System....Pages 203-217
Towards the World-Wide Quantum Network....Pages 218-232
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software....Pages 233-247
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains....Pages 248-262
Privacy of Recent RFID Authentication Protocols....Pages 263-277
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection....Pages 278-289
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation....Pages 290-303
Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic....Pages 304-318
Secure Computation of the Vector Dominance Problem....Pages 319-333
Rational Secret Sharing with Repeated Games....Pages 334-346
Distributed Private Matching and Set Operations....Pages 347-360
Computational Soundness of Non-Malleable Commitments....Pages 361-376
Square Attack on Reduced-Round Zodiac Cipher....Pages 377-391
Analysis of Zipper as a Hash Function....Pages 392-403
On the Importance of the Key Separation Principle for Different Modes of Operation....Pages 404-418
Back Matter....Pages -
备用描述
<p>This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008.</p><p>The 29 revised full papers were carefully reviewed and selected from 95 submissions. The papers cover a wide range of topics in mathematics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve based security practice, security computation and so forth.</p>
开源日期
2011-02-14
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。