Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 50.43
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Condition: New.
Condition: New. pp. xi + 378 1st Edition.
Paperback. Condition: Brand New. revised edition. 390 pages. 9.00x6.00x0.75 inches. In Stock.
Language: English
Published by Springer Berlin Heidelberg, 2000
ISBN 10: 3540673806 ISBN 13: 9783540673804
Seller: moluna, Greven, Germany
Condition: New.
Language: English
Published by Springer Berlin Heidelberg, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Seller: moluna, Greven, Germany
Condition: New.
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on Provable Security for Conventional Crypt- raphy . Many people contributed to ICISC 99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC 99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which nancially sponsored ICISC 99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung.
Language: English
Published by Springer Berlin Heidelberg, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - The 6th International Workshop on Information Security Applications (WISA 2005) was held on Jeju Island, Korea, during August 22 24, 2005. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications, with contributions from the academic community as well as from industry. The wo- shop program covers a wide range of security aspects including network security, e-commerce, cryptography, cryptanalysis, applications and implementation - pects. TheProgramCommitteereceived168papersfrom17countries,andaccepted 29 papers for a full presentation track and 16 papers for a short presentation track. Each paper was carefully evaluated through a peer-review process by at least three members of the Program Committee. This volume contains revised versionsof29papersacceptedandpresentedinthefullpresentationtrack.Short papersonlyappearedintheWISA2005pre-proceedingsaspreliminaryversions, and their extended versions may be published elsewhere. In addition to the contributed papers, the workshop had ve special talks. Moti Yung gave a tutorial talk, entitled Malware Meets Cryptography. Virgil Gligor and Michel Abdalla gave invited talks in the full presentation track, en- tled On the Evolution of Adversary Models in Security Protocols and Public- Key Encryption with Keyword Search, respectively. Finally, Shozo Naito and Jonguk Choi gave invited talks in the short presentation track, entitled New RSA-Type Public-Key Cryptosystem and Its Performance Evaluation and A New Booming Era of DRM: Applications and Extending Business, respectively.
Taschenbuch. Condition: Neu. Information Security Applications | 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers | Jooseok Song (u. a.) | Taschenbuch | xii | Englisch | 2006 | Springer | EAN 9783540310129 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Taschenbuch. Condition: Neu. Information Security and Cryptology - ICISC'99 | Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings | Jooseok Song | Taschenbuch | xii | Englisch | 2000 | Springer | EAN 9783540673804 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Paperback. Condition: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Condition: As New. Unread book in perfect condition.
Language: English
Published by Springer Berlin Heidelberg, Springer Berlin Heidelberg Feb 2006, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The 6th International Workshop on Information Security Applications (WISA 2005) was held on Jeju Island, Korea, during August 22 24, 2005. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications, with contributions from the academic community as well as from industry. The wo- shop program covers a wide range of security aspects including network security, e-commerce, cryptography, cryptanalysis, applications and implementation - pects. TheProgramCommitteereceived168papersfrom17countries,andaccepted 29 papers for a full presentation track and 16 papers for a short presentation track. Each paper was carefully evaluated through a peer-review process by at least three members of the Program Committee. This volume contains revised versionsof29papersacceptedandpresentedinthefullpresentationtrack.Short papersonlyappearedintheWISA2005pre-proceedingsaspreliminaryversions, and their extended versions may be published elsewhere. In addition to the contributed papers, the workshop had ve special talks. Moti Yung gave a tutorial talk, entitled Malware Meets Cryptography. Virgil Gligor and Michel Abdalla gave invited talks in the full presentation track, en- tled On the Evolution of Adversary Models in Security Protocols and Public- Key Encryption with Keyword Search, respectively. Finally, Shozo Naito and Jonguk Choi gave invited talks in the short presentation track, entitled New RSA-Type Public-Key Cryptosystem and Its Performance Evaluation and A New Booming Era of DRM: Applications and Extending Business, respectively. 392 pp. Englisch.
Language: English
Published by Springer Berlin Heidelberg, Springer Apr 2000, 2000
ISBN 10: 3540673806 ISBN 13: 9783540673804
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on Provable Security for Conventional Crypt- raphy . Many people contributed to ICISC 99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC 99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which nancially sponsored ICISC 99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung. 296 pp. Englisch.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. xi + 378 Illus.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. xi + 378.
Language: English
Published by Springer, Springer Apr 2000, 2000
ISBN 10: 3540673806 ISBN 13: 9783540673804
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Invited Talk.- On Provable Security for Conventional Cryptography.- Cryptanalysis and Cryptographic Design.- Correlation Properties of the Bluetooth Combiner.- Preventing Double-Spent Coins from Revealing User's Whole Secret.- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.- Non-linear Complexity of the Naor-Reingold Pseudo-random Function.- Cryptographic Theory and Computation Complexity.- Relationships between Bent Functions and Complementary Plateaued Functions.- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions.- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems.- Speeding Up Elliptic Scalar Multiplication with Precomputation.- Cryptographic Protocol and Authentication Design.- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.- Secure Selection Protocols.- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications.- Digital Signature and Secret Sharing Scheme.- Verifiable Secret Sharing and Time Capsules.- A New Approach to Robust Threshold RSA Signature Schemes.- On Threshold RSA-Signing with no Dealer.- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature.- Electronic Cash, Application, Implementation.- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.- A Security Design for a Wide-Area Distributed System.- Self-Escrowed Public-Key Infrastructures.- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 296 pp. Englisch.
Language: English
Published by Springer, Springer Feb 2006, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Security Analysis and Attacks.- Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes.- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis.- System Security.- An Alert Data Mining Framework for Network-Based Intrusion Detection System.- Key Factors Influencing Worm Infection in Enterprise Networks.- Evaluation of the Unified Modeling Language for Security Requirements Analysis.- Network Security.- A Simple and Efficient Conference Scheme for Mobile Communications.- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model.- Elastic Security QoS Provisioning for Telematics Applications.- DRM/Software Security.- An Improved Algorithm to Watermark Numeric Relational Data.- Video Fingerprinting System Using Wavelet and Error Correcting Code.- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels.- Kimchi: A Binary Rewriting Defense Against Format String Attacks.- Software Protection Through Dynamic Code Mutation.- Efficient HW Implementation.- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ).- Developing and Implementing IHPM on IXP 425 Network Processor Platforms.- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.- mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors.- Side-Channel Attacks.- Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA.- A DPA Countermeasure by Randomized Frobenius Decomposition.- DPA Attack on the Improved Ha-Moon Algorithm.- An Efficient Masking Scheme for AES SoftwareImplementations.- Privacy/Anonymity.- Secure Multi-attribute Procurement Auction.- Oblivious Conjunctive Keyword Search.- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption.- Efficient Implementation.- New Concept of Authority Range for Flexible Management of Role Hierarchy.- Role-Based Access Control Model for Ubiquitous Computing Environment.- Designing Security Auditing Protocol with Web Browsers.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 392 pp. Englisch.