Information Security Applications (Record no. 176383)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06852nam a22006735i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-24591-9 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125307.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 121227s2004 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540245919 |
-- | 978-3-540-24591-9 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/b95188 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Information Security Applications |
Medium | [electronic resource] : |
Remainder of title | 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers / |
Statement of responsibility, etc | edited by Kijoon Chae, Moti Yung. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2004. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 2004. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XII, 512 p. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume number/sequential designation | 2908 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access VPN with Port Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information Assurance -- Mobile Security -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments -- Practical Solution for Location Privacy in Mobile IPv6 -- Intrusion Detection -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access -- An Automatic Security Evaluation System for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism for Smart Space -- Secure System Architecture Based on Dynamic Resource Reallocation -- Fair Exchange with Guardian Angels -- Secure Software, Hardware, and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation Braids -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ) -- E-commerce Security -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction -- Multi-dimensional Hash Chain For Sealed-Bid Auction -- An Improved Forward Integrity Protocol for Mobile Agents -- Digital Rights Management -- Taming “Trusted Platforms” by Operating System Design -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation -- Reducing Storage at Receivers in SD and LSD Broadcast EncryptionSchemes -- Biometrics and Human Interfaces I -- 3D Face Recognition under Pose Varying Environments -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint -- Fingerprint-Based Authentication for USB Token Systems -- Biometrics and Human Interfaces II -- Iris Recognition System Using Wavelet Packet and Support Vector Machines -- Biometrics Identification and Verification Using Projection-Based Face Recognition System -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification -- Public Key Cryptography / Key Management -- E-MHT. An Efficient Protocol for Certificate Status Checking -- A Comment on Group Independent Threshold Sharing -- Automation-Considered Logic of Authentication and Key Distribution -- Applied Cryptography -- The MESH Block Ciphers -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. |
520 ## - SUMMARY, ETC. | |
Summary, etc | The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communication (MIC). The workshop was held in Jeju Island, Korea - ring August 25–27, 2003. This international workshop provided ample technical sessions covering a large spectrum of information security applications. Subjects covered included network/mobile security, electronic commerce security, digital rights management, intrusion detection, secure systems and applications, bio- trics and human interfaces, public key cryptography, and applied cryptography. The program committee received 200 papers from 23 countries (representing most geographic areas where security and applied cryptography research is c- ductedthroughouttheworld).Eachsubmittedpaperwaspeer-reviewedbythree program committee members. This year, we had two tracks: long and short p- sentation tracks. We selected 36 papers for the long presentation track and 34 papers for the short presentation tracks. This volume contains revised versions of papers accepted for the long presentation track. We would like to note that getting accepted to both tracks was an achievement to be proud of, given the competitive nature of WISA this year. Papers in the short presentation track were only published in the WISA preproceedings as preliminary notes; ext- dedversionsofthesenotesmaybepublishedbyfutureconferencesorworkshops. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers, Special purpose. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Operating systems (Computers). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic data processing |
General subdivision | Management. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Special Purpose and Application-Based Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Operating Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | IT Operations. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chae, Kijoon. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Yung, Moti. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783540208273 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783662206072 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
-- | 1611-3349 ; |
Volume number/sequential designation | 2908 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/b95188">https://doi.org/10.1007/b95188</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
912 ## - | |
-- | ZDB-2-BAE |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.