Limit search to available items
Book Cover
E-book
Author ICISC (Conference) (9th : 2006 : Pusan, Korea)

Title Information security and cryptology - ICISC 2006 : 9th international conference, Busan, Korea, November 30 - December 1, 2006 ; proceedings / Min Surp Rhee, Byoungcheon Lee (eds.)
Published Berlin : Springer, 2006

Copies

Description 1 online resource (xiii, 358 pages) : illustrations
Series Lecture notes in computer science ; 4296
Lecture notes in computer science ; 4296.
Contents Invited Talks -- RFID Privacy Based on Public-Key Cryptography -- Generic Attacks on Symmetric Ciphers -- Hash Functions -- I -- Improved Collision Attack on the Hash Function Proposed at PKC'98 -- Hashing with Polynomials -- Birthday Paradox for Multi-collisions -- Block and Stream Ciphers -- New Variant of the Self-Shrinking Generator and Its Cryptographic Properties -- On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher -- On Algebraic Immunity and Annihilators -- Efficient Implementation and Hardware -- High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem -- A High-Speed Square Root Algorithm in Extension Fields -- The Smallest ARIA Module with 16-Bit Architecture -- A Simpler Sieving Device: Combining ECM and TWIRL -- Network Security and Access Control -- Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks -- A Time-Frame Based Trust Model for P2P Systems -- Spatial Context in Role-Based Access Control -- Mobile Communications Security -- An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks -- Mobile RFID Applications and Security Challenges -- Forensics -- An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time -- Copyright Protection -- A Copy Protection Technique Using Multi-level Error Coding -- Digital Rights Management with Right Delegation for Home Networks -- Biometrics -- Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM -- Hash Functions -- II -- Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction -- Cryptanalysis of T-Function-Based Hash Functions -- Collision Search Attack for 53-Step HAS-160 -- Public Key Cryptosystems -- Klein Bottle Routing: An Alternative to Onion Routing and Mix Network -- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle -- Digital Signatures -- A New Proxy Signature Scheme Providing Self-delegation -- Extended Sanitizable Signatures
Analysis algoritmen
algorithms
computeranalyse
computer analysis
wiskunde
mathematics
informatiesystemen
information systems
computerwetenschappen
computer sciences
computernetwerken
computer networks
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Bibliography Includes bibliographical references and index
Notes Print version record
In OhioLINK electronic book center
SpringerLink
Subject Computer security -- Congresses
Cryptography -- Congresses
Informatique.
Computer security.
Cryptography.
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Rhee, Min Surp.
Lee, Byoungcheon.
LC no. 2006936103
ISBN 9783540491149
3540491147
3540491120
9783540491125
Other Titles ICISC 2006