Information security and cryptology--ICISC 2003 :6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers

  • 其他作者: Lim, Jong In. , Lee, Dong Hoon.
  • 出版: Berlin ;New York : Springer 2004.
  • 稽核項: 1 online resource (xii, 458 pages) :illustrations.
  • 叢書名: Lecture notes in computer science,2971
  • 標題: Cryptography Congresses. , Computer security. , COMPUTERS , Cryptology , Information security , Sécurité informatique Congrès. , Cryptographie , Cryptography , Databescherming. , Signature numérique. , Computer security , ICISC , COMPUTERS Internet -- Security. , Cryptographie Congrès. , SecurityGeneral. , Sécurité informatique. , COMPUTERS Networking -- Security. , Electronic books. , Cryptographie (Informatique) , Sécurité informatique , Cryptography. , Computer security Congresses. , NetworkingSecurity. , InternetSecurity. , Cryptage. , Geheimschrift. , Conference papers and proceedings. , COMPUTERS Security -- General.
  • ISBN: 3540246916 , 9783540246916
  • ISBN: 0302-9743 ;
  • 試查全文@TNUA:
  • 附註: Includes bibliographical references and index. Invited Talk -- Binary Tree Encryption: Constructions and Applications -- Digital Signatures I -- A Separable Threshold Ring Signature Scheme -- On the Security of a Group Signature Scheme with Forward Security -- An Efficient Strong Designated Verifier Signature Scheme -- Primitives -- Sound Computational Interpretation of Formal Encryption with Composed Keys -- On the Security of a New Variant of OMAC -- New Methods to Construct Cheating Immune Functions -- Yet Another Definition of Weak Collision Resistance and Its Analysis -- Fast Implementations -- Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2 -- A General Expansion Method Using Efficient Endomorphisms -- Design of Bit Parallel Multiplier with Lower Time Complexity -- Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks -- Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion -- Computer Security/Mobile Security -- Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks -- Extended Role Based Access Control and Procedural Restrictions -- Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System -- Voting/Auction Protocols -- Secure Double Auction Protocols with Full Privacy Protection -- Sealed-Bid Auctions with Efficient Bids -- Providing Receipt-Freeness in Mixnet-Based Voting Protocols -- Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption -- Watermarking -- Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks -- Analysis of the Bounds for Linear Block Codes in Watermark Channel -- Digital Signatures II -- Security Analysis of Some Proxy Signatures -- A More Secure and Efficacious TTS Signature Scheme -- An Efficient Revocation Algorithm in Group Signatures -- Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity -- Authe
  • 摘要: This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.
  • 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=127833
  • 系統號: 005315090
  • 資料類型: 電子書
  • 讀者標籤: 需登入
  • 引用網址: 複製連結