HOME > 상세정보

상세정보

Information security and cryptology--ICISC 2001 : 4th international conference, Seoul, Korea, December 6-7, 2001 : proceedings

Information security and cryptology--ICISC 2001 : 4th international conference, Seoul, Korea, December 6-7, 2001 : proceedings

자료유형
단행본
개인저자
Kim, Kwangjo.
서명 / 저자사항
Information security and cryptology--ICISC 2001 : 4th international conference, Seoul, Korea, December 6-7, 2001 : proceedings / Kwangjo Kim (ed.).
발행사항
Berlin ;   New York :   Springer,   c2002.  
형태사항
xiii, 456 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2288
ISBN
3540433198 (pbk. : alk. paper) 9783540433194 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Cryptography -- Congresses.
000 01397camuu2200361 a 4500
001 000045560697
005 20091119172506
008 020213s2002 gw a b 101 0 eng
010 ▼a 2002022353
020 ▼a 3540433198 (pbk. : alk. paper)
020 ▼a 9783540433194 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm49260568
035 ▼a (OCoLC)49260568
035 ▼a (KERIS)REF000006638730
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I32 2001
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I16i ▼c 2001
111 2 ▼a ICISC 2001 ▼d (2001 : ▼c Seoul, Korea)
245 1 0 ▼a Information security and cryptology--ICISC 2001 : ▼b 4th international conference, Seoul, Korea, December 6-7, 2001 : proceedings / ▼c Kwangjo Kim (ed.).
246 3 0 ▼a ICISC 2001
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2002.
300 ▼a xiii, 456 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2288
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Kim, Kwangjo.
830 0 ▼a Lecture notes in computer science ; ▼v 2288.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I16i 2001 등록번호 121186605 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I16i 2001 등록번호 121186668 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6?7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into the sky on the island of Youido, the Manhattan of Korea, and ranks by far the tallest of all buildings in the country. The program committee received 102 submissions from 17 countries and regions (Australia, Belgium, China, Denmark, France, Germany, India, Italy, Japan, Korea, The Netherlands, Spain, Taiwan, Thailand, Vietnam, UK, and USA), of which 32 were selected for presentation in 8 sessions. All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on “Practical Security in Public-Key Cryptography”. We are very grateful to all the program committee members who devoted much e?ort and valuable time to reading and selecting the papers. These p- ceedingscontainthe?nalversionofeachpaperrevisedaftertheconference.Since the revised versions were not checked by the program committee rigorously, the authors must bear full responsibility for the contents of their papers.

Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6?7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into the sky on the island of Youido, the Manhattan of Korea, and ranks by far the tallest of all buildings in the country. The program committee received 102 submissions from 17 countries and regions (Australia, Belgium, China, Denmark, France, Germany, India, Italy, Japan, Korea, The Netherlands, Spain, Taiwan, Thailand, Vietnam, UK, and USA), of which 32 were selected for presentation in 8 sessions. All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on “Practical Security in Public-Key Cryptography”. We are very grateful to all the program committee members who devoted much e?ort and valuable time to reading and selecting the papers. These p- ceedingscontainthe?nalversionofeachpaperrevisedaftertheconference.Since the revised versions were not checked by the program committee rigorously, the authors must bear full responsibility for the contents of their papers.


정보제공 : Aladin

목차

Practical Security in Public-Key Cryptography.- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.- Truncated Differential Cryptanalysis of Camellia.- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding.- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm.- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.- Decentralized Event Correlation for Intrusion Detection.- Enhancing the Security of Cookies.- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation.- Efficient Revocation Schemes for Secure Multicast.- Binary Codes for Collusion-Secure Fingerprinting.- Copyright Protection of Object-Oriented Software.- Off-Line Authentication Using Watermarks.- Slide Attacks with a Known-Plaintext Cryptanalysis.- Constructions of Cheating Immune Secret Sharing.- Private Computation with Shared Randomness over Broadcast Channel.- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements.- Practical Reasoning about Accountability in Electronic Commerce Protocols.- Content Extraction Signatures.- New Signcryption Schemes Based on KCDSA.- An Efficient and Provably Secure Threshold Blind Signature.- A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks.- A Distributed Light-Weight Authentication Model for Ad-hoc Networks.- Design of an Authentication Protocol for Gsm Javacards.- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.- Protecting General Flexible Itineraries of Mobile Agents.- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.- DPA Countermeasure Based on the "Masking Method".


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)