Coverart for item
The Resource Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings, Juan A. Garay [and others] (eds.), (electronic book)

Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings, Juan A. Garay [and others] (eds.), (electronic book)

Label
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings
Title
Information security
Title remainder
10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings
Statement of responsibility
Juan A. Garay [and others] (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007. The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I85 2007eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2007
http://bibfra.me/vocab/lite/meetingName
ISC (Conference : Information security)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Garay, Juan A.
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
4779
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Computer security
  • Computer science
Label
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings, Juan A. Garay [and others] (eds.), (electronic book)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Intrusion Detection -- Detecting System Emulators -- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems -- E-NIPS: An Event-Based Network Intrusion Prediction System -- Digital Rights Management -- Enabling Fairer Digital Rights Management with Trusted Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security of Elastic Block Ciphers Against Key-Recovery Attacks -- Impossible-Differential Attacks on Large-Block Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols and Schemes -- Efficient Committed Oblivious Transfer of Bit Strings -- An Efficient Certified Email Protocol -- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability -- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures -- Identify-Based Cryptography -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits -- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 -- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as a DoS Counter-Measure? -- Software Obfuscation -- On the Concept of Software Obfuscation in Computer Security -- Specifying Imperative Data Obfuscations -- Public-Key Cryptosystems -- Token-Controlled Public Key Encryption in the Standard Model -- Trapdoor Permutation Polynomials of?/n? and Public Key Cryptosystems -- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring -- Towards a DL-Based Additively Homomorphic Encryption Scheme -- Elliptic Curves and Applications -- Differential Properties of Elliptic Curves and Blind Signatures -- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation -- Database Security and Privacy -- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control -- Efficient Negative Databases from Cryptographic Hash Functions
Control code
SPR184982200
Dimensions
unknown
Extent
1 online resource (xiii, 436 pages)
Form of item
online
Isbn
9783540754961
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-540-75496-1
Other physical details
illustrations.
Specific material designation
remote
Label
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings, Juan A. Garay [and others] (eds.), (electronic book)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Intrusion Detection -- Detecting System Emulators -- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems -- E-NIPS: An Event-Based Network Intrusion Prediction System -- Digital Rights Management -- Enabling Fairer Digital Rights Management with Trusted Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security of Elastic Block Ciphers Against Key-Recovery Attacks -- Impossible-Differential Attacks on Large-Block Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols and Schemes -- Efficient Committed Oblivious Transfer of Bit Strings -- An Efficient Certified Email Protocol -- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability -- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures -- Identify-Based Cryptography -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits -- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 -- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as a DoS Counter-Measure? -- Software Obfuscation -- On the Concept of Software Obfuscation in Computer Security -- Specifying Imperative Data Obfuscations -- Public-Key Cryptosystems -- Token-Controlled Public Key Encryption in the Standard Model -- Trapdoor Permutation Polynomials of?/n? and Public Key Cryptosystems -- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring -- Towards a DL-Based Additively Homomorphic Encryption Scheme -- Elliptic Curves and Applications -- Differential Properties of Elliptic Curves and Blind Signatures -- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation -- Database Security and Privacy -- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control -- Efficient Negative Databases from Cryptographic Hash Functions
Control code
SPR184982200
Dimensions
unknown
Extent
1 online resource (xiii, 436 pages)
Form of item
online
Isbn
9783540754961
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-540-75496-1
Other physical details
illustrations.
Specific material designation
remote

Library Locations

Processing Feedback ...