HOME > 상세정보

상세정보

Information Security and Cryptology--ICISC 2007 : 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings

Information Security and Cryptology--ICISC 2007 : 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings

자료유형
단행본
개인저자
Nam, Kil-Hyun. Rhee, Gwangsoo.
서명 / 저자사항
Information Security and Cryptology--ICISC 2007 : 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings / Kil-Hyun Nam, Gwangsoo Rhee, (eds).
발행사항
Berlin ;   New York :   Springer,   c2007.  
형태사항
xiii, 366 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 4817
ISBN
9783540767879 (pbk. : alk. paper) 3540767878 (pbk. : alk. paper)
서지주기
Includes bibliographical references and author index.
일반주제명
Computer security -- Congresses. Cryptography -- Congresses.
000 01595camuu2200397 a 4500
001 000045560837
005 20091120093306
008 091120s2007 gw a b 101 0 eng c
010 ▼a 2007939824
019 ▼a 182528376
020 ▼a 9783540767879 (pbk. : alk. paper)
020 ▼a 3540767878 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm191829771
035 ▼a (OCoLC)191829771
040 ▼a COO ▼c COO ▼d BTCTA ▼d BAKER ▼d 211009
042 ▼a pcc
050 1 4 ▼a QA76.9.A25 ▼b I32 2007
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I16i ▼c 2007
111 2 ▼a ICISC 2007 ▼d (2007 : ▼c Seoul, Korea)
245 1 0 ▼a Information Security and Cryptology--ICISC 2007 : ▼b 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings / ▼c Kil-Hyun Nam, Gwangsoo Rhee, (eds).
246 3 0 ▼a ICISC 2007
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2007.
300 ▼a xiii, 366 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4817
490 1 ▼a LNCS sublibrary. SL 4, Security and cryptology
504 ▼a Includes bibliographical references and author index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Nam, Kil-Hyun.
700 1 ▼a Rhee, Gwangsoo.
830 0 ▼a Lecture notes in computer science ; ▼v 4817.
830 0 ▼a LNCS sublibrary. ▼n SL 4, ▼p Security and cryptology.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I16i 2007 등록번호 121186670 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.


정보제공 : Aladin

목차

Cryptanalysis - I.- Cryptanalysis of a Hash Function Proposed at ICISC 2006.- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006.- A Cryptanalysis of the Double-Round Quadratic Cryptosystem.- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment.- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.- Handling Dynamic Information Release.- Cryptanalysis - II.- Improving the Time Complexity of Matsui's Linear Cryptanalysis.- On Large Distributions for Linear Cryptanalysis.- Passive Attacks on a Class of Authentication Protocols for RFID.- Side Channel Attacks on Irregularly Decimated Generators.- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.- Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences.- A Secure Virtual Execution Environment for Untrusted Code.- Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum.- Improving Upon the TET Mode of Operation.- Hash Functions - I.- New Local Collisions for the SHA-2 Hash Family.- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4.- New Results on Impossible Differential Cryptanalysis of Reduced AES.- A Note About the Traceability Properties of Linear Codes.- Power Analysis Attacks on MDPL and DRSL Implementations.- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA.- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm.- Hash Functions - II.- Analysis of Multivariate Hash Functions.- Colliding Message Pair for 53-Step HAS-160.- Weaknesses in the HAS-V Compression Function.- Security-Preserving Asymmetric Protocol Encapsulation.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)