Information Security and Cryptology - ICISC 2001 (Record no. 188646)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05758nam a22006255i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-45861-6 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423132522.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 121227s2002 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540458616 |
-- | 978-3-540-45861-6 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/3-540-45861-1 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Information Security and Cryptology - ICISC 2001 |
Medium | [electronic resource] : |
Remainder of title | 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings / |
Statement of responsibility, etc | edited by Kwangjo Kim. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2002. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 2002. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIII, 460 p. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume number/sequential designation | 2288 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Practical Security in Public-Key Cryptography -- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances -- Truncated Differential Cryptanalysis of Camellia -- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton -- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding -- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption -- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm -- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring -- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation -- Decentralized Event Correlation for Intrusion Detection -- Enhancing the Security of Cookies -- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation -- Efficient Revocation Schemes for Secure Multicast -- Binary Codes for Collusion-Secure Fingerprinting -- Copyright Protection of Object-Oriented Software -- Off-Line Authentication Using Watermarks -- Slide Attacks with a Known-Plaintext Cryptanalysis -- Constructions of Cheating Immune Secret Sharing -- Private Computation with Shared Randomness over Broadcast Channel -- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements -- Practical Reasoning about Accountability in Electronic Commerce Protocols -- Content Extraction Signatures -- New Signcryption Schemes Based on KCDSA -- An Efficient and Provably Secure Threshold Blind Signature -- A Multi-signature Scheme with Signers’ Intentions Secure against Active Attacks -- A Distributed Light-Weight Authentication Model for Ad-hoc Networks -- Design of an Authentication Protocol for Gsm Javacards -- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile ComputingEnvironment -- Protecting General Flexible Itineraries of Mobile Agents -- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis -- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack -- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks -- DPA Countermeasure Based on the “Masking Method”. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6–7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into the sky on the island of Youido, the Manhattan of Korea, and ranks by far the tallest of all buildings in the country. The program committee received 102 submissions from 17 countries and regions (Australia, Belgium, China, Denmark, France, Germany, India, Italy, Japan, Korea, The Netherlands, Spain, Taiwan, Thailand, Vietnam, UK, and USA), of which 32 were selected for presentation in 8 sessions. All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on “Practical Security in Public-Key Cryptography”. We are very grateful to all the program committee members who devoted much e?ort and valuable time to reading and selecting the papers. These p- ceedingscontainthe?nalversionofeachpaperrevisedaftertheconference.Since the revised versions were not checked by the program committee rigorously, the authors must bear full responsibility for the contents of their papers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science |
General subdivision | Mathematics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Discrete mathematics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic data processing |
General subdivision | Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Discrete Mathematics in Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | IT Operations. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kim, Kwangjo. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783540433194 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783662168929 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
-- | 1611-3349 ; |
Volume number/sequential designation | 2288 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/3-540-45861-1">https://doi.org/10.1007/3-540-45861-1</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
912 ## - | |
-- | ZDB-2-BAE |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.