Cantitate/Preț
Produs

Information Security and Cryptology - ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers: Lecture Notes in Computer Science, cartea 3506

Editat de Choonsik Park, Seongtaek Chee
en Limba Engleză Paperback – iun 2005

Din seria Lecture Notes in Computer Science

Preț: 63224 lei

Preț vechi: 74381 lei
-15% Nou

Puncte Express: 948

Preț estimativ în valută:
12101 12612$ 10073£

Carte tipărită la comandă

Livrare economică 06-20 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540262268
ISBN-10: 3540262261
Pagini: 512
Ilustrații: XIV, 490 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.71 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Invited Talks.- Security by, and for, Converged Mobile Devices.- Security for Ubiquitous Computing.- Block Cipher and Stream Cipher.- Algebraic Attacks on Combiners with Memory and Several Outputs.- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.- Dragon: A Fast Word Based Stream Cipher.- Public Key Cryptosystem.- An Efficient and Verifiable Solution to the Millionaire Problem.- All in the XL Family: Theory and Practice.- Efficient Broadcast Encryption Using Multiple Interpolation Methods.- On Private Scalar Product Computation for Privacy-Preserving Data Mining.- PKI and Related Implementation.- Separable Implicit Certificate Revocation.- Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation.- Improvement on Ha-Moon Randomized Exponentiation Algorithm.- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.- Digital Signature.- On Subliminal Channels in Deterministic Signature Schemes.- Threshold Entrusted Undeniable Signature.- On the Security Models of (Threshold) Ring Signature Schemes.- Identity Based Threshold Ring Signature.- Batch Verifications with ID-Based Signatures.- Elliptic Curve Cryptosystem.- A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method.- Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations.- New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method.- Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Provable Security and Primitives.- On the Pseudorandomness of a Modification of KASUMI Type Permutations.- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model.- Padding Oracle Attacks on Multiple Modes of Operation.- An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.- Network Security.- Identity-Based Access Control for Ad Hoc Groups.- Mobile Mixing.- A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems.- ADWICE – Anomaly Detection with Real-Time Incremental Clustering.- Steganography.- Steganography for Executables and Code Transformation Signatures.- On Security Notions for Steganalysis.- A Block Oriented Fingerprinting Scheme in Relational Database.- Biometrics.- A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis.- Profile-Based 3D Face Registration and Recognition.