FEEDBACK Smiley face

Information Security (Record no. 15793)

000 -LEADER
fixed length control field 05899nam a22006015i 4500
001 - CONTROL NUMBER
control field 978-3-540-39981-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170515111549.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121227s2003 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540399810
-- 978-3-540-39981-0
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/b13828
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 23
245 10 - TITLE STATEMENT
Title Information Security
Medium [electronic resource] :
Remainder of title 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003. Proceedings /
Statement of responsibility, etc edited by Colin Boyd, Wenbo Mao.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2003.
300 ## - PHYSICAL DESCRIPTION
Extent XII, 448 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 2851
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Invited Talk -- Revisiting Software Protection -- Network Security -- Enabling Shared Audit Data -- Cryptographically Generated Addresses (CGA) -- Validating and Securing Spontaneous Associations between Wireless Devices -- Single Sign-On Using Trusted Platforms -- Public-Key Algorithms -- Easy Verifiable Primitives and Practical Public Key Cryptosystems -- Reactively Secure Signature Schemes -- Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation -- A Fast Signature Scheme Based on New On-line Computation -- Cryptographic Protocols -- Distributed RSA Signature Schemes for General Access Structures -- Divisible Voting Scheme -- Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations -- The Design and Implementation of Protocol-Based Hidden Key Recovery -- Invited Talk -- Intrinsic Limitations of Digital Signatures and How to Cope with Them -- Protocol Attacks -- On the Security of Fair Non-repudiation Protocols -- Security Analysis of a Password Authenticated Key Exchange Protocol -- Attacks on Public Key Algorithms -- Zero-Value Point Attacks on Elliptic Curve Cryptosystem -- Cryptanalysis of an Algebraic Privacy Homomorphism -- Analysis of the Insecurity of ECMQV with Partially Known Nonces -- Block Ciphers -- Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES -- A Note on Weak Keys of PES, IDEA, and Some Extended Variants -- Foundations of Differential Cryptanalysis in Abelian Groups -- Authorization -- Trust and Authorization in Pervasive B2E Scenarios -- A Logic Model for Temporal Authorization Delegation with Negation -- Watermarking -- Zero-Distortion Authentication Watermarking -- Designated Verification of Non-invertible Watermark -- Software Security -- Proactive Software Tampering Detection -- Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits -- Towards a Business Process-Driven Framework for Security Engineering with the UML -- Codes and Related Issues -- Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes -- Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations -- Short c-Secure Fingerprinting Codes -- The Role of Arbiters in Asymmetric Authentication Schemes.
520 ## - SUMMARY, ETC.
Summary, etc The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Special purpose computers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithms.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management information systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Special Purpose and Application-Based Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management of Computing and Information Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Boyd, Colin.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mao, Wenbo.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540201762
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 0302-9743 ;
Volume number/sequential designation 2851
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/b13828
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-LNC
912 ## -
-- ZDB-2-BAE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type e-Book

No items available.


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in