Information Security and Cryptology - ICISC 2004
Springer Berlin (Verlag)
978-3-540-26226-8 (ISBN)
Invited Talks.- Security by, and for, Converged Mobile Devices.- Security for Ubiquitous Computing.- Block Cipher and Stream Cipher.- Algebraic Attacks on Combiners with Memory and Several Outputs.- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.- Dragon: A Fast Word Based Stream Cipher.- Public Key Cryptosystem.- An Efficient and Verifiable Solution to the Millionaire Problem.- All in the XL Family: Theory and Practice.- Efficient Broadcast Encryption Using Multiple Interpolation Methods.- On Private Scalar Product Computation for Privacy-Preserving Data Mining.- PKI and Related Implementation.- Separable Implicit Certificate Revocation.- Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation.- Improvement on Ha-Moon Randomized Exponentiation Algorithm.- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.- Digital Signature.- On Subliminal Channels in Deterministic Signature Schemes.- Threshold Entrusted Undeniable Signature.- On the Security Models of (Threshold) Ring Signature Schemes.- Identity Based Threshold Ring Signature.- Batch Verifications with ID-Based Signatures.- Elliptic Curve Cryptosystem.- A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method.- Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations.- New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method.- Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Provable Security and Primitives.- On the Pseudorandomness of a Modification of KASUMI Type Permutations.- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model.- Padding Oracle Attacks on Multiple Modes of Operation.- An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.- Network Security.- Identity-Based Access Control for Ad Hoc Groups.- Mobile Mixing.- A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems.- ADWICE - Anomaly Detection with Real-Time Incremental Clustering.- Steganography.- Steganography for Executables and Code Transformation Signatures.- On Security Notions for Steganalysis.- A Block Oriented Fingerprinting Scheme in Relational Database.- Biometrics.- A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis.- Profile-Based 3D Face Registration and Recognition.
Erscheint lt. Verlag | 1.6.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 490 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 712 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | algorithm • Algorithm analysis and problem complexity • algorithms • biometric security • Code • Computational Number Theory • Cryptanalysis • cryptography • Cryptology • Cryptosystems • Database • data encryption • Digital Signatures • Information • Information Security • Internet Security • Mobile Security • Network Security • Oracle • web service security • WINDOWS |
ISBN-10 | 3-540-26226-1 / 3540262261 |
ISBN-13 | 978-3-540-26226-8 / 9783540262268 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich