コンテンツへ移動
Advances in information and computer security : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings 資料のプレビュー
閉じる資料のプレビュー
確認中…

Advances in information and computer security : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings

著者: Goichiro Hanaoka; Toshihiro Yamauchi, (Computer scientist)
出版: Berlin ; New York : Springer, ©2012.
シリーズ: Lecture notes in computer science, 7631.
エディション/フォーマット:   電子書籍 : Document : Conference publication : Englishすべてのエディションとフォーマットを見る
データベース:WorldCat
概要:
This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols.
評価:

(まだ評価がありません) 0 件のレビュー - 是非あなたから!

件名:
関連情報:

 

オンラインで入手

この資料へのリンク

オフラインで入手

&AllPage.SpinnerRetrieving; この資料の所蔵館を検索中…

詳細

ジャンル/形式: Electronic books
Conference proceedings
Congresses
資料の種類: Conference publication, Document, インターネット資料
ドキュメントの種類: インターネットリソース, コンピューターファイル
すべての著者/寄与者: Goichiro Hanaoka; Toshihiro Yamauchi, (Computer scientist)
ISBN: 9783642341175 3642341179
OCLC No.: 820879069
注記: International conference proceedings.
Includes author index.
物理形態: 1 online resource.
コンテンツ: Model-Based Conformance Testing for Android / Yiming Jing, Gail-Joon Ahn and Hongxin Hu --
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography / Takanori Yasuda, Tsuyoshi Takagi and Kouichi Sakurai --
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU / Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling and Axel Poschmann, et al. --
Very Short Critical Path Implementation of AES with Direct Logic Gates / Kenta Nekado, Yasuyuki Nogami and Kengo Iokibe --
One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary / Kazuki Yoneyama --
Compact Stateful Encryption Schemes with Ciphertext Verifiability / S. Sree Vivek, S. Sharmila Deva Selvi and C. Pandu Rangan --
Structured Encryption for Conceptual Graphs / Geong Sen Poh, Moesfa Soeheila Mohamad and Muhammad Reza Z'aba --
Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability / Akinori Kawachi, Hirotoshi Takebe and Keisuke Tanaka --
Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI / Takanori Isobe, Toshihiro Ohigashi and Masakatu Morii --
Boomerang Distinguishers for Full HAS-160 Compression Function / Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama and Kazuo Ohta --
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function / Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta --
Annihilators of Fast Discrete Fourier Spectra Attacks / Jingjing Wang, Kefei Chen and Shixiong Zhu --
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher / Jiqiang Lu, Yongzhuang Wei, Enes Pasalic and Pierre-Alain Fouque --
Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security / Susumu Kiyoshima, Yoshifumi Manabe and Tatsuaki Okamoto --
Efficient Secure Primitive for Privacy Preserving Distributed Computations / Youwen Zhu, Tsuyoshi Takagi and Liusheng Huang --
Generic Construction of GUC Secure Commitment in the KRK Model / Itsuki Suzuki, Maki Yoshida and Toru Fujiwara.
シリーズタイトル: Lecture notes in computer science, 7631.
その他のタイトル: IWSEC 2012
責任者: Goichiro Hanaoka, Toshihiro Yamauchi (eds.).
その他の情報:

概要:

Constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012.  続きを読む

レビュー

ユーザーレビュー
GoodReadsのレビューを取得中…
DOGObooksのレビューを取得中…

タグ

まずはあなたから!
リクエストの確認

あなたは既にこの資料をリクエストしている可能性があります。このリクエストを続行してよろしければ、OK を選択してください。

リンクデータ


<http://www.worldcat.org/oclc/820879069>
library:oclcnum"820879069"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/820879069>
rdf:typeschema:Book
schema:about
<http://id.worldcat.org/fast/872484>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures."
schema:name"Computer security"
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:copyrightYear"2012"
schema:creator
schema:datePublished"2012"
schema:description"This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols."
schema:editor
<http://viaf.org/viaf/295767032>
rdf:typeschema:Person
schema:familyName"Yamauchi"
schema:givenName"Toshihiro"
schema:name"Yamauchi, Toshihiro (Computer scientist)"
schema:editor
schema:exampleOfWork<http://worldcat.org/entity/work/id/1186107419>
schema:genre"Electronic books."
schema:genre"Conference proceedings"
schema:genre"Conference proceedings."
schema:inLanguage"en"
schema:name"Advances in information and computer security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings"
schema:name"IWSEC 2012"
schema:publisher
schema:url
schema:url<http://dx.doi.org/10.1007/978-3-642-34117-5>
schema:workExample

Content-negotiable representations

ウインドウを閉じる

WorldCatにログインしてください 

アカウントをお持ちではないですか?簡単に 無料アカウントを作成することができます。.