Staff View for: Information security practice and experi

 Staff view

You must be logged in to Tag Records

Information security practice and experience [electronic resource] : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 : proceedings /

Feng Bao, Hui Li, Guilin Wang (eds.).

Book Cover
Names: Bao, Feng, | Li, Hui, | Wang, Guilin,
Published: Berlin ; Springer, 2009.
Series: LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 5451.
Topics: Computer security - Congresses. | Computer networks - Security measures - Congresses. | Data protection - Congresses.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 04201cam a2200445Ii 4500
001 11123675
005 20140621205451.0
006 m d
007 cr unu
008 090413s2009 gw a sb 101 0 eng d
020 |a9783642008436
020 |a3642008437
035 |a(OCoLC)ocn318369946
035 |a(IITdb)806109
037 |a978-3-642-00843-6|bSpringer|nhttp://www.springerlink.com
040 |aCUS|cCUS|dC$Q|dWAU|dIITdb
049 |aILLA
050 4|aQA76.9.A25|bI855 2009
111 2 |aISPEC 2009|d(2009 :|cXi'an, Shaanxi Sheng, China)
245 10|aInformation security practice and experience|h[electronic resource] :|b5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 : proceedings /|cFeng Bao, Hui Li, Guilin Wang (eds.).
246 30|aISPEC 2009
260 |aBerlin ;|aNew York :|bSpringer,|c2009.
300 |axiv, 410 p. :|bdigital, PDF file
440 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology
490 1 |aLecture notes in computer science,|x0302-9743 ;|v5451
500 |aTitle from PDF t.p. (SpringerLink, viewed Apr. 10, 2009).
504 |aIncludes bibliographical references and index.
505 0 |aEfficient and provable secure ciphertext-policy attribute-based encryption schemes -- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length -- RSA-based certificateless public key encryption -- Strongly unforgeable ID-based signatures without random oracles -- On the security of a certificate-based signature scheme and its improvement with pairings -- An empirical investigation into the security of phone features in SIP-based VoIP systems -- Reconstructing a packed DLL binary for static analysis -- Static analysis of a class of memory leaks in trustBSD MAC framework -- Efficient concurrent n poly (log n )-simulatable argument of knowledge -- New constructions for reusable, non-erasure and universally composable commitments -- Certificateless hybrid signcryption -- On non-representable secret sharing matroids -- A novel adaptive watermarking scheme based on human visual system and particle swarm optimization -- Defending against the pirate evolution attack -- Security specification for conversion technologies of heterogeneous DRM systems -- Analysing protocol implementations -- Measuring anonymity -- A hybrid e-voting scheme -- A framework for authenticated key exchange in the standard model -- Secret handshake : Strong anonymity definition and construction -- An extended authentication and key agreement protocol of UMTS -- Hash-based key management schemes for MPEG4-FGS -- Twister--a framework for secure and fast hash functions -- Preimage attack on hash function RIPEMD -- Full key-recovery attack on the HMAC/NMAC based on 3 and 4-pass HAVAL -- Memoryless related-key boomerang attack on the full tiger block cipher -- Memoryless related-key boomerang attack on 39-round SHACAL-2 -- Some new observations on the sms4 block cipher in the chinese WAPI standard -- On the correctness of an approach against side-channel attacks -- Ranking attack graphs with graph neural networks -- Implementing IDS management on lock-keeper -- Ensuring dual security modes in RFID-enabled supply chain systems -- Achieving better privacy protection in wireless sensor networks using trusted computing -- Trusted privacy domains--challenges for trusted computing in privacy-protecting information sharing.
538 |aMode of access: World Wide Web.
650 0|aComputer security|vCongresses.
650 0|aComputer networks|xSecurity measures|vCongresses.
650 0|aData protection|vCongresses.
700 1 |aBao, Feng,|cDr.
700 1 |aLi, Hui,|d1968-
700 1 |aWang, Guilin,|cDr.
776 08|iPrint version:|tInformation security practice and experience.|dBerlin : Springer, 2009|z9783642008429|w(OCoLC)317921204
830 0|aLecture notes in computer science ;|v5451.
852 0 |bGER|hQA76.9.A25|iI855 2009eb
856 40|3SpringerLink|uhttps://ezproxy.gl.iit.edu/login?url=http://dx.doi.org/10.1007/978-3-642-00843-6|zAccess to the electronic version for current IIT main & branch campus students, faculty, & staff.
994 |a92|bILL

Staff View for: Information security practice and experi