The Resource Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings, Agnes Hui Chan, Virgil Gligor (eds.)

Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings, Agnes Hui Chan, Virgil Gligor (eds.)

Label
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings
Title
Information security
Title remainder
5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings
Statement of responsibility
Agnes Hui Chan, Virgil Gligor (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
DLC
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I85 2002
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2002
http://bibfra.me/vocab/lite/meetingName
ISC (Conference : Information security)
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1948-
http://library.link/vocab/relatedWorkOrContributorName
  • Chan, Agnes Hui
  • Gligor, Virgil D
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Beveiliging
  • Informatiesystemen
  • REDES E COMUNICAÇÃO DE DADOS (CONGRESSOS)
  • SEGURANÇA EM COMPUTADOR (CONGRESSOS)
  • Ordinateurs
  • Sécurité informatique
  • Computer security
  • Computers
  • Informatiesystemen
  • Beveiliging
  • SEGURANÇA EM COMPUTADOR (CONGRESSOS)
  • REDES E COMUNICAÇÃO DE DADOS (CONGRESSOS)
  • Datensicherung
  • Electronic Commerce
  • Kommunikationsprotokoll
  • Kongress
  • Kryptologie
  • Management-Trust
  • Zugriffskontrolle
Label
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings, Agnes Hui Chan, Virgil Gligor (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Real-Time Intruder Tracing through Self-Replication / Heejin Jang and Sangwook Kim -- On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon -- Intrusion Detection with Support Vector Machines and Generative Models / John S. Baras and Maben Rabi -- Small and High-Speed Architectures for the 3GPP Standard Cipher KASUMI / Akashi Satoh and Sumio Morioka -- Fast Software Implementations of SC2000 / Helger Lipmaa -- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 / Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman and Brian Schott -- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG / Kahil Jallad, Jonathan Katz and Bruce Schneier -- Role-Based Access Control for E-commerce Sea-of-Data Applications / G. Navarro, S. Robles and J. Borrell -- An Access Control Model for Tree Data Structures / Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurenti Gallon and Emmanuel Bruno -- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI / Ed Dawson, Javier Lopez, Jose A. Montenegro and Eiji Okamoto -- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks / Feng Zhu, Duncan S. Wong, Agnes H. Chan and Robbie Ye -- Quantifying Privacy Leakage through Answering Database Queries / Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang and Jeremy K.-P. Chen -- A New Offline Privacy Protecting E-cash System with Revokable Anonymity / Weidong Qiu, Kefei Chen and Dawu Gu -- Receipt-Free Sealed-Bid Auction / Masayuki Abe and Koutarou Suzuki -- Exclusion-Freeness in Multi-party Exchange Protocols / Nicolas Gonzalez-Deleito and Olivier Markowitch -- A Realistic Protocol for Multi-party Certified Electronic Mail / Josep Lluis Ferrer-Gomila, Magdalena Payeras-Capella and Llorenc Huguet-Rotger -- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification / Shunsuke Araki -- Comments to the UNCITRAL Model Law on Electronic Signatures / Apol-lonia Martinez-Nadal and Josep Lluis Ferrer-Gomila -- An Anonymous Loan System Based on Group Signature Scheme / Rie Shigetomi, Akira Otsuka, Takahide Ogawa and Hideki Imai -- Traceability Schemes for Signed Documents / Shoko Yanezawa, Goichiro Hanaoka, Junji Shikata and Hideki Imai -- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications / Emmanuel Bresson and Jacques Stern -- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2[superscript m]) / Nam-Yeun Kim, Dae-Ghon Kho and Kee-Young Yoo -- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2[superscript m]) / Soonhak Kwon and Heuisu Ryu -- Conditional Cryptographic Delegation for P2P Data Sharing / Yuji Watanabe and Masayuki Numao -- Certification of Public Keys within an Identity Based System / L. Chen, K. Harrison, A. Moss, D. Soldera and N. P. Smart -- A New Public Key Cryptosystem for Constrained Hardware / Jiande Zheng -- A Distributed and Computationally Secure Key Distribution Scheme / Vanesa Daza, Javier Herranz, Carles Padro and German Saez -- On Optimal Hash Tree Traversal for Interval Time-Stamping / Helger Lipmaa -- An Efficient Dynamic and Distributed Cryptographic Accumulator / Michael T. Goodrich, Roberto Tamassia and Jasminka Hasic -- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks / Katsuyuki Okeya and Kouichi Sakurai -- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks / Bodo Moller -- Automated Analysis of Some Security Mechanisms of SCEP / Fabio Martinelli, Marinella Petrocchi and Anna Vaccarelli -- An Attack on a Protocol for Certified Delivery / Jose R. M. Monteiro and Ricardo Dahab -- Oblivious Counter and Majority Protocol / Hiroaki Kikuchi -- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network / Wai Han Soo, Azman Samsudin and Alwyn Goh -- Fingerprinting Concatenated Codes with Efficient Identification / M. Fernandez and M. Soriano -- A Provably Secure Additive and Multiplicative Privacy Homomorphism / Josep Domingo-Ferrer -- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars / Yasuyuki Sakai and Kouichi Sakurai
Dimensions
24 cm.
Dimensions
unknown
Extent
xii, 502 pages
Isbn
9783540442707
Lccn
2002030633
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)50510808
  • (OCoLC)ocm50510808
Label
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings, Agnes Hui Chan, Virgil Gligor (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Real-Time Intruder Tracing through Self-Replication / Heejin Jang and Sangwook Kim -- On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon -- Intrusion Detection with Support Vector Machines and Generative Models / John S. Baras and Maben Rabi -- Small and High-Speed Architectures for the 3GPP Standard Cipher KASUMI / Akashi Satoh and Sumio Morioka -- Fast Software Implementations of SC2000 / Helger Lipmaa -- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 / Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman and Brian Schott -- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG / Kahil Jallad, Jonathan Katz and Bruce Schneier -- Role-Based Access Control for E-commerce Sea-of-Data Applications / G. Navarro, S. Robles and J. Borrell -- An Access Control Model for Tree Data Structures / Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurenti Gallon and Emmanuel Bruno -- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI / Ed Dawson, Javier Lopez, Jose A. Montenegro and Eiji Okamoto -- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks / Feng Zhu, Duncan S. Wong, Agnes H. Chan and Robbie Ye -- Quantifying Privacy Leakage through Answering Database Queries / Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang and Jeremy K.-P. Chen -- A New Offline Privacy Protecting E-cash System with Revokable Anonymity / Weidong Qiu, Kefei Chen and Dawu Gu -- Receipt-Free Sealed-Bid Auction / Masayuki Abe and Koutarou Suzuki -- Exclusion-Freeness in Multi-party Exchange Protocols / Nicolas Gonzalez-Deleito and Olivier Markowitch -- A Realistic Protocol for Multi-party Certified Electronic Mail / Josep Lluis Ferrer-Gomila, Magdalena Payeras-Capella and Llorenc Huguet-Rotger -- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification / Shunsuke Araki -- Comments to the UNCITRAL Model Law on Electronic Signatures / Apol-lonia Martinez-Nadal and Josep Lluis Ferrer-Gomila -- An Anonymous Loan System Based on Group Signature Scheme / Rie Shigetomi, Akira Otsuka, Takahide Ogawa and Hideki Imai -- Traceability Schemes for Signed Documents / Shoko Yanezawa, Goichiro Hanaoka, Junji Shikata and Hideki Imai -- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications / Emmanuel Bresson and Jacques Stern -- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2[superscript m]) / Nam-Yeun Kim, Dae-Ghon Kho and Kee-Young Yoo -- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2[superscript m]) / Soonhak Kwon and Heuisu Ryu -- Conditional Cryptographic Delegation for P2P Data Sharing / Yuji Watanabe and Masayuki Numao -- Certification of Public Keys within an Identity Based System / L. Chen, K. Harrison, A. Moss, D. Soldera and N. P. Smart -- A New Public Key Cryptosystem for Constrained Hardware / Jiande Zheng -- A Distributed and Computationally Secure Key Distribution Scheme / Vanesa Daza, Javier Herranz, Carles Padro and German Saez -- On Optimal Hash Tree Traversal for Interval Time-Stamping / Helger Lipmaa -- An Efficient Dynamic and Distributed Cryptographic Accumulator / Michael T. Goodrich, Roberto Tamassia and Jasminka Hasic -- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks / Katsuyuki Okeya and Kouichi Sakurai -- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks / Bodo Moller -- Automated Analysis of Some Security Mechanisms of SCEP / Fabio Martinelli, Marinella Petrocchi and Anna Vaccarelli -- An Attack on a Protocol for Certified Delivery / Jose R. M. Monteiro and Ricardo Dahab -- Oblivious Counter and Majority Protocol / Hiroaki Kikuchi -- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network / Wai Han Soo, Azman Samsudin and Alwyn Goh -- Fingerprinting Concatenated Codes with Efficient Identification / M. Fernandez and M. Soriano -- A Provably Secure Additive and Multiplicative Privacy Homomorphism / Josep Domingo-Ferrer -- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars / Yasuyuki Sakai and Kouichi Sakurai
Dimensions
24 cm.
Dimensions
unknown
Extent
xii, 502 pages
Isbn
9783540442707
Lccn
2002030633
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)50510808
  • (OCoLC)ocm50510808

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...