The Resource Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.)
Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.)
Resource Information
The item Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009. The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services
- Language
- eng
- Extent
- 1 online resource (xiv, 508 pages)
- Contents
-
- Analysis Techniques
- A New Approach to? 2 Cryptanalysis of Block Ciphers
- Analysis and Optimization of Cryptographically Generated Addresses
- Security Analysis of the PACE Key-Agreement Protocol
- Towards Security Notions for White-Box Cryptography
- A Calculus to Detect Guessing Attacks
- Hash Functions
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- On Free-Start Collisions and Collisions for TIB3
- Database Security and Biometrics
- Detection of Database Intrusion Using a Two-Stage Fuzzy System
- Combining Consistency and Confidentiality Requirements in First-Order Databases
- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping
- Iris Recognition in Nonideal Situations
- Algebraic Attacks and Proxy Re-Encryption
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- A New Construction of Boolean Functions with Maximum Algebraic Immunity
- Distributed System Security
- A2M: Access-Assured Mobile Desktop Computing
- Automated Spyware Collection and Analysis
- Towards Unifying Vulnerability Information for Attack Graph Construction
- Traitor Tracing without A Priori Bound on the Coalition Size
- SISR
- A New Model for Epidemic Spreading of Electronic Threats
- Identity Management and Authentication
- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
- Robust Authentication Using Physically Unclonable Functions
- Risks of the CardSpace Protocol
- Applied Cryptography
- Fair E-Cash: Be Compact, Spend Faster
- On the Security of Identity Based Ring Signcryption Schemes
- A Storage Efficient Redactable Signature in the Standard Model
- Generic Construction of Stateful Identity Based Encryption
- Access Control
- Privacy-Aware Attribute-Based Encryption with User Accountability
- Hardware-Assisted Application-Level Access Control
- Towards Trustworthy Delegation in Role-Based Access Control Model
- Secure Interoperation in Multidomain Environments Employing UCON Policies
- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control
- MAC and Nonces
- Nonce Generators and the Nonce Reset Problem
- MAC Precomputation with Applications to Secure Memory
- HMAC without the "Second" Key
- P2P and Web Services
- Adding Trust to P2P Distribution of Paid Content
- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
- Isbn
- 9783642044748
- Label
- Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings
- Title
- Information security
- Title remainder
- 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings
- Statement of responsibility
- Pierangela Samarati [and others] (eds.)
- Subject
-
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Computersicherheit
- Conference papers and proceedings
- Conference papers and proceedings
- Datensicherung
- Eindringerkennung
- Informatique
- Kryptoanalyse
- Kryptosystem
- Sicherheitsprotokoll
- Trusted Computing
- Zugriffskontrolle
- Authentifikation
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009. The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I85 2009
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2009
- http://bibfra.me/vocab/lite/meetingName
- ISC (Conference : Information security)
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Samarati, Pierangela
- Series statement
- Lecture notes in computer science,
- Series volume
- 5735
- http://library.link/vocab/subjectName
-
- Computer security
- Computers
- Informatique
- Computer security
- Computers
- Authentifikation
- Computersicherheit
- Datensicherung
- Eindringerkennung
- Kryptoanalyse
- Kryptosystem
- Sicherheitsprotokoll
- Trusted Computing
- Zugriffskontrolle
- Label
- Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Analysis Techniques -- A New Approach to? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR -- A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the "Second" Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
- Control code
- 489216274
- Dimensions
- unknown
- Extent
- 1 online resource (xiv, 508 pages)
- Form of item
- online
- Isbn
- 9783642044748
- Lccn
- 2009934111
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-04474-8.
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-642-04473-1
- Specific material designation
- remote
- System control number
- (OCoLC)489216274
- Label
- Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Analysis Techniques -- A New Approach to? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR -- A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the "Second" Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
- Control code
- 489216274
- Dimensions
- unknown
- Extent
- 1 online resource (xiv, 508 pages)
- Form of item
- online
- Isbn
- 9783642044748
- Lccn
- 2009934111
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-04474-8.
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-642-04473-1
- Specific material designation
- remote
- System control number
- (OCoLC)489216274
Subject
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Computersicherheit
- Conference papers and proceedings
- Conference papers and proceedings
- Datensicherung
- Eindringerkennung
- Informatique
- Kryptoanalyse
- Kryptosystem
- Sicherheitsprotokoll
- Trusted Computing
- Zugriffskontrolle
- Authentifikation
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Information-security--12th-international/34an5TFQqHs/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Information-security--12th-international/34an5TFQqHs/">Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Information-security--12th-international/34an5TFQqHs/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Information-security--12th-international/34an5TFQqHs/">Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings, Pierangela Samarati [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>