HOME > 상세정보

상세정보

Information security : 6th international conference, ISC 2003, Bristol, UK, October 1-3, 2003 : proceedings

Information security : 6th international conference, ISC 2003, Bristol, UK, October 1-3, 2003 : proceedings

자료유형
단행본
개인저자
Boyd, Colin. Mao, Wenbo.
서명 / 저자사항
Information security : 6th international conference, ISC 2003, Bristol, UK, October 1-3, 2003 : proceedings / Colin Boyd, Wenbo Mao (eds.).
발행사항
Berlin ;   New York :   Springer,   c2003.  
형태사항
xi, 441 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2851
ISBN
3540201769 (pbk. : alk. paper) 9783540201762 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Computers -- Access control -- Congresses.
000 01430camuu2200373 a 4500
001 000045560898
005 20091120163237
008 031009s2003 gw a b 101 0 eng
010 ▼a 2003063080
020 ▼a 3540201769 (pbk. : alk. paper)
020 ▼a 9783540201762 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm53223680
035 ▼a (OCoLC)53223680
035 ▼a (KERIS)REF000009775380
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I85 2003
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I77i ▼c 2003
111 2 ▼a ISC 2003 ▼d (2003 : ▼c Bristol, England)
245 1 0 ▼a Information security : ▼b 6th international conference, ISC 2003, Bristol, UK, October 1-3, 2003 : proceedings / ▼c Colin Boyd, Wenbo Mao (eds.).
246 3 0 ▼a ISC 2003
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2003.
300 ▼a xi, 441 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2851
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computers ▼x Access control ▼v Congresses.
700 1 ▼a Boyd, Colin.
700 1 ▼a Mao, Wenbo.
830 0 ▼a Lecture notes in computer science ; ▼v 2851.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I77i 2003 등록번호 121186571 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.


정보제공 : Aladin

목차

Invited Talk.- Revisiting Software Protection.- Network Security.- Enabling Shared Audit Data.- Cryptographically Generated Addresses (CGA).- Validating and Securing Spontaneous Associations between Wireless Devices.- Single Sign-On Using Trusted Platforms.- Public-Key Algorithms.- Easy Verifiable Primitives and Practical Public Key Cryptosystems.- Reactively Secure Signature Schemes.- Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.- A Fast Signature Scheme Based on New On-line Computation.- Cryptographic Protocols.- Distributed RSA Signature Schemes for General Access Structures.- Divisible Voting Scheme.- Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.- The Design and Implementation of Protocol-Based Hidden Key Recovery.- Invited Talk.- Intrinsic Limitations of Digital Signatures and How to Cope with Them.- Protocol Attacks.- On the Security of Fair Non-repudiation Protocols.- Security Analysis of a Password Authenticated Key Exchange Protocol.- Attacks on Public Key Algorithms.- Zero-Value Point Attacks on Elliptic Curve Cryptosystem.- Cryptanalysis of an Algebraic Privacy Homomorphism.- Analysis of the Insecurity of ECMQV with Partially Known Nonces.- Block Ciphers.- Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES.- A Note on Weak Keys of PES, IDEA, and Some Extended Variants.- Foundations of Differential Cryptanalysis in Abelian Groups.- Authorization.- Trust and Authorization in Pervasive B2E Scenarios.- A Logic Model for Temporal Authorization Delegation with Negation.- Watermarking.- Zero-Distortion Authentication Watermarking.- Designated Verification of Non-invertible Watermark.- Software Security.- Proactive Software Tampering Detection.- Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits.- Towards a Business Process-Driven Framework for Security Engineering with the UML.- Codes and Related Issues.- Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes.- Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.- Short c-Secure Fingerprinting Codes.- The Role of Arbiters in Asymmetric Authentication Schemes.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)