Coverart for item
The Resource Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)

Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)

Label
Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
Title
Information security
Title remainder
8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
Statement of responsibility
Jianying Zhou [and others] (eds.)
Title variation
ISC 2005
Creator
Contributor
Subject
Genre
Language
eng
Summary
"This volume contains the proceedings of the 8th International Information Security Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005."
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
Language note
English
LC call number
QA76.9.A25
LC item number
I85 2005eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2005
http://bibfra.me/vocab/lite/meetingName
ISC (Conference : Information security)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Zhou, Jianying
Series statement
Lecture notes in computer science,
Series volume
3650
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer security
  • Computers
  • Informatique
  • Computer security
  • Computers
  • Authentifikation
  • Computersicherheit
  • Datensicherung
  • Eindringerkennung
  • Elektronische Unterschrift
  • Kryptosystem
  • Rechnernetz
  • Zugriffskontrolle
  • Sécurité informatique
  • Contrôle d'accès
  • Sécurité des réseaux
  • Cryptographie (Informatique)
  • Ordinateur
Label
Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings --?Trust Engineering:? From Requirements to System Design and Maintenance -- A Working National Lottery System Experience -- A Privacy Preserving Rental System -- Key Management & Protocols -- Constant Round Dynamic Group Key Agreement -- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design -- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms -- On the Notion of Statistical Security in Simulatability Definitions -- Public Key Encryption & Signature -- Certificateless Public Key Encryption Without Pairing -- Tracing-by-Linking Group Signatures -- Chaum's Designated Confirmer Signature Revisited -- Network Security II -- gore: Routing-Assisted Defense Against DDoS Attacks -- IPSec Support in NAT-PT Scenario for IPv6 Transition -- Signcryption -- Hybrid Signcryption Schemes with Outsider Security -- Analysis and Improvement of a Signcryption Scheme with Key Privacy -- Efficient and Proactive Threshold Signcryption -- Crypto Algorithm & Analysis -- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? -- Hardware Architecture and Cost Estimates for Breaking SHA-1 -- On the Security of Tweakable Modes of Operation: TBC and TAE -- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm -- Cryptography -- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing -- An Oblivious Transfer Protocol with Log-Squared Communication -- Applications -- Electronic Voting: Starting Over? -- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System -- Universally Composable Time-Stamping Schemes with Audit -- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption -- Software Security -- Building a Cryptovirus Using Microsoft's Cryptographic API -- On the Security of the WinRAR Encryption Method -- Towards Better Software Tamper Resistance -- Authorization & Access Control -- Device-Enabled Authorization in the Grey System -- Evaluating Access Control Policies Through Model Checking -- A Cryptographic Solution for General Access Control -- Student Papers -- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting -- A Formal Definition for Trust in Distributed Systems -- A Practical Voting Scheme with Receipts -- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation -- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models
Control code
262681849
Dimensions
unknown
Extent
1 online resource (xii, 516 pages)
Form of item
online
Isbn
9783540319306
Lccn
2005932344
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/11556992
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-29001-8
Specific material designation
remote
System control number
(OCoLC)262681849
Label
Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings --?Trust Engineering:? From Requirements to System Design and Maintenance -- A Working National Lottery System Experience -- A Privacy Preserving Rental System -- Key Management & Protocols -- Constant Round Dynamic Group Key Agreement -- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design -- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms -- On the Notion of Statistical Security in Simulatability Definitions -- Public Key Encryption & Signature -- Certificateless Public Key Encryption Without Pairing -- Tracing-by-Linking Group Signatures -- Chaum's Designated Confirmer Signature Revisited -- Network Security II -- gore: Routing-Assisted Defense Against DDoS Attacks -- IPSec Support in NAT-PT Scenario for IPv6 Transition -- Signcryption -- Hybrid Signcryption Schemes with Outsider Security -- Analysis and Improvement of a Signcryption Scheme with Key Privacy -- Efficient and Proactive Threshold Signcryption -- Crypto Algorithm & Analysis -- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? -- Hardware Architecture and Cost Estimates for Breaking SHA-1 -- On the Security of Tweakable Modes of Operation: TBC and TAE -- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm -- Cryptography -- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing -- An Oblivious Transfer Protocol with Log-Squared Communication -- Applications -- Electronic Voting: Starting Over? -- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System -- Universally Composable Time-Stamping Schemes with Audit -- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption -- Software Security -- Building a Cryptovirus Using Microsoft's Cryptographic API -- On the Security of the WinRAR Encryption Method -- Towards Better Software Tamper Resistance -- Authorization & Access Control -- Device-Enabled Authorization in the Grey System -- Evaluating Access Control Policies Through Model Checking -- A Cryptographic Solution for General Access Control -- Student Papers -- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting -- A Formal Definition for Trust in Distributed Systems -- A Practical Voting Scheme with Receipts -- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation -- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models
Control code
262681849
Dimensions
unknown
Extent
1 online resource (xii, 516 pages)
Form of item
online
Isbn
9783540319306
Lccn
2005932344
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/11556992
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-29001-8
Specific material designation
remote
System control number
(OCoLC)262681849

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...