HOME > 상세정보

상세정보

Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers

Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers

자료유형
단행본
개인저자
Park, Choonsik. Chee, Seongtaek.
서명 / 저자사항
Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers / Choonsik Park, Seongtaek Chee (eds.).
발행사항
Berlin ;   New York :   Springer,   c2005.  
형태사항
xiv, 490 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 3506
ISBN
3540262261 (pbk. : alk. paper) 9783540262268 (pbk. : alk. paper)
서지주기
Includes bibliographic references and index.
일반주제명
Computer security -- Congresses. Cryptography -- Congresses.
000 01807camuu2200445 a 4500
001 000045560838
005 20091120104633
008 050502s2005 gw a ba 101 0 eng c
010 ▼a 2005926827
015 ▼a GBA555872 ▼2 bnb
016 7 ▼a 013226576 ▼2 Uk
020 ▼a 3540262261 (pbk. : alk. paper)
020 ▼a 9783540262268 (pbk. : alk. paper)
035 ▼a (CStRLIN)PAUGV3872454-B
035 ▼a (PU)3872454
035 ▼a (OCoLC)ocm60613547
035 ▼a (OCoLC)60613547
035 ▼a (KERIS)REF000012416898
040 ▼a OHX ▼c OHX ▼d ZCU ▼d UKM ▼d BAKER ▼d C$Q ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I32 2004
072 7 ▼a QA ▼2 lcco
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I16i ▼c 2004
111 2 ▼a ICISC 2004 ▼d (2004 : ▼c Seoul, Korea)
245 1 0 ▼a Information security and cryptology--ICISC 2004 : ▼b 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers / ▼c Choonsik Park, Seongtaek Chee (eds.).
246 3 0 ▼a ICISC 2004
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xiv, 490 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3506
504 ▼a Includes bibliographic references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Park, Choonsik.
700 1 ▼a Chee, Seongtaek.
830 0 ▼a Lecture notes in computer science ; ▼v 3506.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I16i 2004 등록번호 121186669 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I16i 2004 등록번호 121186783 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communi- tion of Korea. The conference received 194 submissions, and the Program Committee - lected 34 of these for presentation. The conference program included two invited lectures.MikeReiterspokeon"Securityby,andfor,ConvergedMobileDevices." And Frank Stajano spoke on "Security for Ubiquitous Computing." We would like to ?rst thank the many researchers from all over the world who subm- ted their work to this conference. An electronic submission process was ava- able. The submission review process had two phases. In the ?rst phase, Program Committeememberscompiledreports(assistedattheirdiscretionbysubreferees of their choice, but without interaction with other Program Committee m- bers) and entered them, via a Web interface, into the Web Review software. We would like to thank the developers, Bart Preneel, Wim Moreau, and Joris Claessens. Without the Web Review system, the whole review process would not have been possible. In the second phase, Program Committee members used the software to browse each other's reports, and discuss and update their own reports.WeareextremelygratefultotheProgramCommittee membersfortheir enormous investment of time, e?ort, and adrenaline in the di?cult and delicate process of review and selection.


정보제공 : Aladin

목차

Invited Talks.- Security by, and for, Converged Mobile Devices.- Security for Ubiquitous Computing.- Block Cipher and Stream Cipher.- Algebraic Attacks on Combiners with Memory and Several Outputs.- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.- Dragon: A Fast Word Based Stream Cipher.- Public Key Cryptosystem.- An Efficient and Verifiable Solution to the Millionaire Problem.- All in the XL Family: Theory and Practice.- Efficient Broadcast Encryption Using Multiple Interpolation Methods.- On Private Scalar Product Computation for Privacy-Preserving Data Mining.- PKI and Related Implementation.- Separable Implicit Certificate Revocation.- Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation.- Improvement on Ha-Moon Randomized Exponentiation Algorithm.- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.- Digital Signature.- On Subliminal Channels in Deterministic Signature Schemes.- Threshold Entrusted Undeniable Signature.- On the Security Models of (Threshold) Ring Signature Schemes.- Identity Based Threshold Ring Signature.- Batch Verifications with ID-Based Signatures.- Elliptic Curve Cryptosystem.- A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method.- Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations.- New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method.- Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Provable Security and Primitives.- On the Pseudorandomness of a Modification of KASUMI Type Permutations.- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model.- Padding Oracle Attacks on Multiple Modes of Operation.- An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.- Network Security.- Identity-Based Access Control for Ad Hoc Groups.- Mobile Mixing.- A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems.- ADWICE - Anomaly Detection with Real-Time Incremental Clustering.- Steganography.- Steganography for Executables and Code Transformation Signatures.- On Security Notions for Steganalysis.- A Block Oriented Fingerprinting Scheme in Relational Database.- Biometrics.- A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis.- Profile-Based 3D Face Registration and Recognition.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)