HOME > 상세정보

상세정보

Security and privacy in the age of ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan

Security and privacy in the age of ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan (2회 대출)

자료유형
단행본
개인저자
Sasaki, Ryoichi.
서명 / 저자사항
Security and privacy in the age of ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan / edited by Ryoichi Sasaki ... [et al.].
발행사항
New York :   Springer ,   2005.  
형태사항
xvi, 612 p. : ill. ; 25 cm.
총서사항
International Federation for Information Processing ; 181
ISBN
038725658X (alk. paper)
서지주기
Includes bibliographical references.
일반주제명
Computer security -- Congresses. Computer networks -- Security measures -- Congresses. Ubiquitous computing -- Congresses.
000 01275camuu22003014a 4500
001 000045204594
005 20051111101318
008 050324s2005 nyua b 100 0 eng
010 ▼a 2005046558
020 ▼a 038725658X (alk. paper)
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b T38 2005
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I233s
111 2 ▼a IFIP TC11 International Information Security Conference ▼n (20th : ▼d 2005 : ▼c Chiba, Japan)
245 1 0 ▼a Security and privacy in the age of ubiquitous computing : ▼b IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan / ▼c edited by Ryoichi Sasaki ... [et al.].
260 ▼a New York : ▼b Springer , ▼c 2005.
300 ▼a xvi, 612 p. : ▼b ill. ; ▼c 25 cm.
490 1 ▼a International Federation for Information Processing ; ▼v 181
504 ▼a Includes bibliographical references.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computer networks ▼x Security measures ▼v Congresses.
650 0 ▼a Ubiquitous computing ▼v Congresses.
700 1 ▼a Sasaki, Ryoichi.
830 0 ▼a International Federation for Information Processing (Series) ; ▼v 181.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I233s 등록번호 121113119 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

New feature

International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit springeronline.com.

 

For more information about IFIP, please visit www.ifip.or.at.




정보제공 : Aladin

목차

Regular Papers.- Accountable Anonymous E-Mail.- Protecting Consumer Data in Composite Web Services.- A Decision Matrix Approach.- Assignment of Security Clearances in an Organization.- Tool Supported Management of Information Security Culture.- ERPSEC - A Reference Framework to Enhance Security in ERP Systems.- A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.- A Secure Quantum Communication Protocol Using Insecure Public Channels.- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.- Design and Implementation of TPM SUP320.- Mathematical Models of IP Traceback Methods and Their Verification.- Transferable E-Cash Revisit.- A License Transfer System for Supporting Content Portability in Digital Rights Management.- Secure Human Communications Based on Biometrics Signals.- Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks.- An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN.- The Pairing Problem with User Interaction.- Network Smart Card.- Protection Against Spam Using Pre-Challenges.- Automatically Hardening Web Applications Using Precise Tainting.- Traffic Redirection Attack Protection System (TRAPS).- Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks.- Design, Implementation, and Evaluation of Fritrace.- Design and Implementation of a High-Performance Network Intrusion Prevention System.- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis.- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.- Designated-Verifier Proxy Signature Schemes.- Tripartite Concurrent Signatures.- Signcryption in Hierarchical Identity Based Cryptosystem.- Protecting Group Dynamic Information in Large Scale Multicast Groups.- Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks.- Ensuring Media Integrity on Third-Party Infrastructures.- A New Fragile Mesh Watermarking Algorithm for Authentication.- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images.- Workshop Papers.- Overcoming Channel Bandwidth Constraints in Secure SIM Applications.- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.- On-the-Fly Formal Testing of a Smart Card Applet.- A Computationally Feasible SPA Attack on AES VIA Optimized Search.- The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations.- Streamto: Streaming Content Using a Tamper-Resistant Token.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)