Information Security and Cryptology - ICISC 2002 (Record no. 188608)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05431nam a22006855i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-36552-5 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423132520.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 121227s2003 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540365525 |
-- | 978-3-540-36552-5 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/3-540-36552-4 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Information Security and Cryptology - ICISC 2002 |
Medium | [electronic resource] : |
Remainder of title | 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers / |
Statement of responsibility, etc | edited by Pil Joong Lee, Chae Hoon Lim. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2003. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 2003. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XII, 544 p. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume number/sequential designation | 2587 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Invited Talk -- Cut-&-Paste Attacks with JAVA -- Digital Signatures -- Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption -- New DSA-Verifiable Signcryption Schemes -- Convertible Group Undeniable Signatures -- An Efficient Fail-Stop Signature Scheme Based on Factorization -- On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme -- Internet Security -- System Specification Based Network Modeling for Survivability Testing Simulation -- A Risk-Sensitive Intrusion Detection Model -- Applet Verification Strategies for RAM-Constrained Devices -- Block/Stream Ciphers -- Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks -- Consistent Differential Patterns of Rijndael -- Hardware Design and Analysis of Block Cipher Components -- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt -- Stream Ciphers & Other Primitives -- On the Efficiency of the Clock Control Guessing Attack -- Balanced Shrinking Generators -- On the Universal Hash Functions in Luby-Rackoff Cipher -- Threshold MACs -- Ideal Threshold Schemes from MDS Codes -- Efficient Implementations -- New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms -- Efficient Computations of the Tate Pairing for the Large MOV Degrees -- Improved Techniques for Fast Exponentiation -- Efficient Hardware Multiplicative Inverters -- Side-Channel Attacks -- Ways to Enhance Differential Power Analysis -- A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion -- A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem -- Hardware Fault Attack on RSA with CRT Revisited -- Cryptographic Protocols I -- Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer -- Non-interactive Auction Scheme with Strong Privacy.-An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control -- Speeding Up Secure Sessions Establishment on the Internet -- Cryptographic Protocols II -- On Fairness in Exchange Protocols -- A Model for Embedding and Authorizing Digital Signatures in Printed Documents -- A Dynamic Group Key Distribution Scheme with Flexible User Join -- Efficient Multicast Key Management for Stateless Receivers -- Biometrics -- Fingerprint Verification System Involving Smart Card -- A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Operating systems (Computers). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science |
General subdivision | Mathematics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Discrete mathematics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic data processing |
General subdivision | Management. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Operating Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Discrete Mathematics in Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | IT Operations. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Lee, Pil Joong. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Lim, Chae Hoon. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783540007166 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783662186824 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
-- | 1611-3349 ; |
Volume number/sequential designation | 2587 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/3-540-36552-4">https://doi.org/10.1007/3-540-36552-4</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
912 ## - | |
-- | ZDB-2-BAE |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.