
Information security practice and experience : third international conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007 : proceedings
Nhà xuất bản : Springer
Năm xuất bản : 2008
Mô tả vật lý : 371 p.
Chủ đề : 1. Computer networks. 2. Computer security. 3. Data protection. 4. Security measures. 5. Book.
Thông tin chi tiết
Tóm tắt : | Invited Talks. Application Security – Myth Or Reality? -- Tools and Technology for Computer Forensics: Research and Development in Hong Kong -- Cryptanalysis: A Linear Analysis of Blowfish and Khufu-- Related-Key Rectangle Attack on 43-Round SHACAL-2-- On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis—Signatures: A Sanitizable Signature Scheme with Aggregation-- A Novel Verifiably Encrypted Signature Scheme Without Random Oracle -- Certificate Based (Linkable) Ring Signature -- An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess’s Scheme -- On the Sequentiality of Three Optimal Structured Multisignature Schemes -- Network Security and Security Managemen: Secure Feedback Service in Wireless Sensor Networks -- An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols -- Practical Uses of Virtual Machines for Protection of Sensitive User Data -- Formalization of RBAC Policy with Object Class Hierarchy -- Privacy and Applications: Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers -- Two-Party Privacy-Preserving Agglomerative Document Clustering -- Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction -- Cryptographic Algorithms and Implementations: How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication – Ring Extension Method -- Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices -- Some Efficient Algorithms for the Final Exponentiation of ηT Pairing -- Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems… |
Thông tin dữ liệu nguồn
Thư viện | Ký hiệu xếp giá | Dữ liệu nguồn |
---|---|---|
![]() |
|
https://repository.vnu.edu.vn/handle/VNU_123/24077 |