Information Security and Cryptology--ICISC 2007 : 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings
| 000 | 01595camuu2200397 a 4500 | |
| 001 | 000045560837 | |
| 005 | 20091120093306 | |
| 008 | 091120s2007 gw a b 101 0 eng c | |
| 010 | ▼a 2007939824 | |
| 019 | ▼a 182528376 | |
| 020 | ▼a 9783540767879 (pbk. : alk. paper) | |
| 020 | ▼a 3540767878 (pbk. : alk. paper) | |
| 035 | ▼a (OCoLC)ocm191829771 | |
| 035 | ▼a (OCoLC)191829771 | |
| 040 | ▼a COO ▼c COO ▼d BTCTA ▼d BAKER ▼d 211009 | |
| 042 | ▼a pcc | |
| 050 | 1 4 | ▼a QA76.9.A25 ▼b I32 2007 |
| 082 | 0 4 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b I16i ▼c 2007 | |
| 111 | 2 | ▼a ICISC 2007 ▼d (2007 : ▼c Seoul, Korea) |
| 245 | 1 0 | ▼a Information Security and Cryptology--ICISC 2007 : ▼b 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings / ▼c Kil-Hyun Nam, Gwangsoo Rhee, (eds). |
| 246 | 3 0 | ▼a ICISC 2007 |
| 260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2007. | |
| 300 | ▼a xiii, 366 p. : ▼b ill. ; ▼c 24 cm. | |
| 490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4817 |
| 490 | 1 | ▼a LNCS sublibrary. SL 4, Security and cryptology |
| 504 | ▼a Includes bibliographical references and author index. | |
| 650 | 0 | ▼a Computer security ▼v Congresses. |
| 650 | 0 | ▼a Cryptography ▼v Congresses. |
| 700 | 1 | ▼a Nam, Kil-Hyun. |
| 700 | 1 | ▼a Rhee, Gwangsoo. |
| 830 | 0 | ▼a Lecture notes in computer science ; ▼v 4817. |
| 830 | 0 | ▼a LNCS sublibrary. ▼n SL 4, ▼p Security and cryptology. |
| 945 | ▼a KINS |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 I16i 2007 | 등록번호 121186670 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.
정보제공 :
목차
Cryptanalysis - I.- Cryptanalysis of a Hash Function Proposed at ICISC 2006.- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006.- A Cryptanalysis of the Double-Round Quadratic Cryptosystem.- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment.- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.- Handling Dynamic Information Release.- Cryptanalysis - II.- Improving the Time Complexity of Matsui's Linear Cryptanalysis.- On Large Distributions for Linear Cryptanalysis.- Passive Attacks on a Class of Authentication Protocols for RFID.- Side Channel Attacks on Irregularly Decimated Generators.- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.- Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences.- A Secure Virtual Execution Environment for Untrusted Code.- Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum.- Improving Upon the TET Mode of Operation.- Hash Functions - I.- New Local Collisions for the SHA-2 Hash Family.- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4.- New Results on Impossible Differential Cryptanalysis of Reduced AES.- A Note About the Traceability Properties of Linear Codes.- Power Analysis Attacks on MDPL and DRSL Implementations.- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA.- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm.- Hash Functions - II.- Analysis of Multivariate Hash Functions.- Colliding Message Pair for 53-Step HAS-160.- Weaknesses in the HAS-V Compression Function.- Security-Preserving Asymmetric Protocol Encapsulation.
정보제공 :
