Coverart for item
The Resource Security and Privacy in the Age of Ubiquitous Computing : IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan, edited by Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura, (electronic resource)

Security and Privacy in the Age of Ubiquitous Computing : IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan, edited by Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura, (electronic resource)

Label
Security and Privacy in the Age of Ubiquitous Computing : IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan
Title
Security and Privacy in the Age of Ubiquitous Computing
Title remainder
IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan
Statement of responsibility
edited by Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit springeronline.com. For more information about IFIP, please visit www.ifip.or.at
Member of
http://library.link/vocab/creatorName
Sasaki, Ryoichi
Image bit depth
0
LC call number
QA76.9.A25
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Qing, Sihan.
  • Okamoto, Eiji
  • Yoshiura, Hiroshi.
  • SpringerLink
Series statement
IFIP Advances in Information and Communication Technology,
Series volume
181
http://library.link/vocab/subjectName
  • Computer science
  • Data structures (Computer science)
  • Data encryption (Computer science)
  • Information systems
  • Multimedia systems
  • Mathematics
  • Computer Science
  • Data Encryption
  • Data Structures, Cryptology and Information Theory
  • Information Systems and Communication Service
  • Multimedia Information Systems
  • Applications of Mathematics
Label
Security and Privacy in the Age of Ubiquitous Computing : IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan, edited by Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Regular Papers -- Accountable Anonymous E-Mail -- Protecting Consumer Data in Composite Web Services -- A Decision Matrix Approach -- Assignment of Security Clearances in an Organization -- Tool Supported Management of Information Security Culture -- ERPSEC - A Reference Framework to Enhance Security in ERP Systems -- A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises -- A Secure Quantum Communication Protocol Using Insecure Public Channels -- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems -- Design and Implementation of TPM SUP320 -- Mathematical Models of IP Traceback Methods and Their Verification -- Transferable E-Cash Revisit -- A License Transfer System for Supporting Content Portability in Digital Rights Management -- Secure Human Communications Based on Biometrics Signals -- Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks -- An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN -- The Pairing Problem with User Interaction -- Network Smart Card -- Protection Against Spam Using Pre-Challenges -- Automatically Hardening Web Applications Using Precise Tainting -- Traffic Redirection Attack Protection System (TRAPS) -- Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks -- Design, Implementation, and Evaluation of Fritrace -- Design and Implementation of a High-Performance Network Intrusion Prevention System -- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis -- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection -- Designated-Verifier Proxy Signature Schemes -- Tripartite Concurrent Signatures -- Signcryption in Hierarchical Identity Based Cryptosystem -- Protecting Group Dynamic Information in Large Scale Multicast Groups -- Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks -- Ensuring Media Integrity on Third-Party Infrastructures -- A New Fragile Mesh Watermarking Algorithm for Authentication -- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images -- Workshop Papers -- Overcoming Channel Bandwidth Constraints in Secure SIM Applications -- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation -- On-the-Fly Formal Testing of a Smart Card Applet -- A Computationally Feasible SPA Attack on AES VIA Optimized Search -- The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations -- Streamto: Streaming Content Using a Tamper-Resistant Token
Dimensions
unknown
Extent
XVI, 616 p. 130 illus.
File format
multiple file formats
Form of item
electronic
Isbn
9780387256603
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/b135818
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-0-387-25660-3
Label
Security and Privacy in the Age of Ubiquitous Computing : IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan, edited by Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Regular Papers -- Accountable Anonymous E-Mail -- Protecting Consumer Data in Composite Web Services -- A Decision Matrix Approach -- Assignment of Security Clearances in an Organization -- Tool Supported Management of Information Security Culture -- ERPSEC - A Reference Framework to Enhance Security in ERP Systems -- A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises -- A Secure Quantum Communication Protocol Using Insecure Public Channels -- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems -- Design and Implementation of TPM SUP320 -- Mathematical Models of IP Traceback Methods and Their Verification -- Transferable E-Cash Revisit -- A License Transfer System for Supporting Content Portability in Digital Rights Management -- Secure Human Communications Based on Biometrics Signals -- Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks -- An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN -- The Pairing Problem with User Interaction -- Network Smart Card -- Protection Against Spam Using Pre-Challenges -- Automatically Hardening Web Applications Using Precise Tainting -- Traffic Redirection Attack Protection System (TRAPS) -- Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks -- Design, Implementation, and Evaluation of Fritrace -- Design and Implementation of a High-Performance Network Intrusion Prevention System -- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis -- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection -- Designated-Verifier Proxy Signature Schemes -- Tripartite Concurrent Signatures -- Signcryption in Hierarchical Identity Based Cryptosystem -- Protecting Group Dynamic Information in Large Scale Multicast Groups -- Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks -- Ensuring Media Integrity on Third-Party Infrastructures -- A New Fragile Mesh Watermarking Algorithm for Authentication -- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images -- Workshop Papers -- Overcoming Channel Bandwidth Constraints in Secure SIM Applications -- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation -- On-the-Fly Formal Testing of a Smart Card Applet -- A Computationally Feasible SPA Attack on AES VIA Optimized Search -- The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations -- Streamto: Streaming Content Using a Tamper-Resistant Token
Dimensions
unknown
Extent
XVI, 616 p. 130 illus.
File format
multiple file formats
Form of item
electronic
Isbn
9780387256603
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/b135818
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-0-387-25660-3

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...