The Resource Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)
Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)
Resource Information
The item Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- "This volume contains the proceedings of the 8th International Information Security Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005."
- Language
- eng
- Extent
- 1 online resource (xii, 516 pages)
- Contents
-
- Network Security I
- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks
- SVision: A Network Host-Centered Anomaly Visualization Technique
- Trust & Privacy
- Time-Based Release of Confidential Information in Hierarchical Settings --?Trust Engineering:? From Requirements to System Design and Maintenance
- A Working National Lottery System Experience
- A Privacy Preserving Rental System
- Key Management & Protocols
- Constant Round Dynamic Group Key Agreement
- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design
- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms
- On the Notion of Statistical Security in Simulatability Definitions
- Public Key Encryption & Signature
- Certificateless Public Key Encryption Without Pairing
- Tracing-by-Linking Group Signatures
- Chaum's Designated Confirmer Signature Revisited
- Network Security II
- gore: Routing-Assisted Defense Against DDoS Attacks
- IPSec Support in NAT-PT Scenario for IPv6 Transition
- Signcryption
- Hybrid Signcryption Schemes with Outsider Security
- Analysis and Improvement of a Signcryption Scheme with Key Privacy
- Efficient and Proactive Threshold Signcryption
- Crypto Algorithm & Analysis
- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
- Hardware Architecture and Cost Estimates for Breaking SHA-1
- On the Security of Tweakable Modes of Operation: TBC and TAE
- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm
- Cryptography
- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing
- An Oblivious Transfer Protocol with Log-Squared Communication
- Applications
- Electronic Voting: Starting Over?
- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System
- Universally Composable Time-Stamping Schemes with Audit
- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption
- Software Security
- Building a Cryptovirus Using Microsoft's Cryptographic API
- On the Security of the WinRAR Encryption Method
- Towards Better Software Tamper Resistance
- Authorization & Access Control
- Device-Enabled Authorization in the Grey System
- Evaluating Access Control Policies Through Model Checking
- A Cryptographic Solution for General Access Control
- Student Papers
- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting
- A Formal Definition for Trust in Distributed Systems
- A Practical Voting Scheme with Receipts
- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models
- Isbn
- 9783540290018
- Label
- Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
- Title
- Information security
- Title remainder
- 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
- Statement of responsibility
- Jianying Zhou [and others] (eds.)
- Title variation
- ISC 2005
- Subject
-
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Computersicherheit
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Cryptographie (Informatique)
- Datensicherung
- Eindringerkennung
- Elektronische Unterschrift
- Informatique
- Kongress
- Kryptosystem
- Ordinateur
- Rechnernetz
- Singapur (2005))
- Sécurité des réseaux
- Sécurité informatique
- Zugriffskontrolle
- Authentifikation
- Language
- eng
- Summary
- "This volume contains the proceedings of the 8th International Information Security Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005."
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- Language note
- English
- LC call number
- QA76.9.A25
- LC item number
- I85 2005eb
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2005
- http://bibfra.me/vocab/lite/meetingName
- ISC (Conference : Information security)
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Zhou, Jianying
- Series statement
- Lecture notes in computer science,
- Series volume
- 3650
- http://library.link/vocab/subjectName
-
- Computer security
- Computers
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Computer security
- Computers
- Informatique
- Computer security
- Computers
- Authentifikation
- Computersicherheit
- Datensicherung
- Eindringerkennung
- Elektronische Unterschrift
- Kryptosystem
- Rechnernetz
- Zugriffskontrolle
- Sécurité informatique
- Contrôle d'accès
- Sécurité des réseaux
- Cryptographie (Informatique)
- Ordinateur
- Label
- Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings --?Trust Engineering:? From Requirements to System Design and Maintenance -- A Working National Lottery System Experience -- A Privacy Preserving Rental System -- Key Management & Protocols -- Constant Round Dynamic Group Key Agreement -- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design -- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms -- On the Notion of Statistical Security in Simulatability Definitions -- Public Key Encryption & Signature -- Certificateless Public Key Encryption Without Pairing -- Tracing-by-Linking Group Signatures -- Chaum's Designated Confirmer Signature Revisited -- Network Security II -- gore: Routing-Assisted Defense Against DDoS Attacks -- IPSec Support in NAT-PT Scenario for IPv6 Transition -- Signcryption -- Hybrid Signcryption Schemes with Outsider Security -- Analysis and Improvement of a Signcryption Scheme with Key Privacy -- Efficient and Proactive Threshold Signcryption -- Crypto Algorithm & Analysis -- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? -- Hardware Architecture and Cost Estimates for Breaking SHA-1 -- On the Security of Tweakable Modes of Operation: TBC and TAE -- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm -- Cryptography -- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing -- An Oblivious Transfer Protocol with Log-Squared Communication -- Applications -- Electronic Voting: Starting Over? -- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System -- Universally Composable Time-Stamping Schemes with Audit -- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption -- Software Security -- Building a Cryptovirus Using Microsoft's Cryptographic API -- On the Security of the WinRAR Encryption Method -- Towards Better Software Tamper Resistance -- Authorization & Access Control -- Device-Enabled Authorization in the Grey System -- Evaluating Access Control Policies Through Model Checking -- A Cryptographic Solution for General Access Control -- Student Papers -- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting -- A Formal Definition for Trust in Distributed Systems -- A Practical Voting Scheme with Receipts -- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation -- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models
- Control code
- 262681849
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 516 pages)
- Form of item
- online
- Isbn
- 9783540290018
- Lccn
- 2005932344
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/11556992
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-29001-8
- Specific material designation
- remote
- System control number
- (OCoLC)262681849
- Label
- Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings --?Trust Engineering:? From Requirements to System Design and Maintenance -- A Working National Lottery System Experience -- A Privacy Preserving Rental System -- Key Management & Protocols -- Constant Round Dynamic Group Key Agreement -- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design -- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms -- On the Notion of Statistical Security in Simulatability Definitions -- Public Key Encryption & Signature -- Certificateless Public Key Encryption Without Pairing -- Tracing-by-Linking Group Signatures -- Chaum's Designated Confirmer Signature Revisited -- Network Security II -- gore: Routing-Assisted Defense Against DDoS Attacks -- IPSec Support in NAT-PT Scenario for IPv6 Transition -- Signcryption -- Hybrid Signcryption Schemes with Outsider Security -- Analysis and Improvement of a Signcryption Scheme with Key Privacy -- Efficient and Proactive Threshold Signcryption -- Crypto Algorithm & Analysis -- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? -- Hardware Architecture and Cost Estimates for Breaking SHA-1 -- On the Security of Tweakable Modes of Operation: TBC and TAE -- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm -- Cryptography -- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing -- An Oblivious Transfer Protocol with Log-Squared Communication -- Applications -- Electronic Voting: Starting Over? -- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System -- Universally Composable Time-Stamping Schemes with Audit -- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption -- Software Security -- Building a Cryptovirus Using Microsoft's Cryptographic API -- On the Security of the WinRAR Encryption Method -- Towards Better Software Tamper Resistance -- Authorization & Access Control -- Device-Enabled Authorization in the Grey System -- Evaluating Access Control Policies Through Model Checking -- A Cryptographic Solution for General Access Control -- Student Papers -- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting -- A Formal Definition for Trust in Distributed Systems -- A Practical Voting Scheme with Receipts -- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation -- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models
- Control code
- 262681849
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 516 pages)
- Form of item
- online
- Isbn
- 9783540290018
- Lccn
- 2005932344
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/11556992
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-29001-8
- Specific material designation
- remote
- System control number
- (OCoLC)262681849
Subject
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Computersicherheit
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Cryptographie (Informatique)
- Datensicherung
- Eindringerkennung
- Elektronische Unterschrift
- Informatique
- Kongress
- Kryptosystem
- Ordinateur
- Rechnernetz
- Singapur (2005))
- Sécurité des réseaux
- Sécurité informatique
- Zugriffskontrolle
- Authentifikation
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Information-security--8th-international/zJDG7dCMLwY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Information-security--8th-international/zJDG7dCMLwY/">Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Information-security--8th-international/zJDG7dCMLwY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Information-security--8th-international/zJDG7dCMLwY/">Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings, Jianying Zhou [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>