skip to content
Advances in information and computer security : proceedings Preview this item
ClosePreview this item
Checking...

Advances in information and computer security : proceedings

Author: Goichiro Hanaoka; et al
Publisher: Heidelberg : Springer, 2012.
Series: Lecture notes in computer science, 7631
Edition/Format:   Print book : EnglishView all editions and formats
Database:WorldCat
Summary:

Constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Goichiro Hanaoka; et al
ISBN: 9783642341168 3642341160 9783642341175 3642341179
OCLC Number: 820789232
Description: 260 S : Ill.
Contents: Model-Based Conformance Testing for Android.- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU.- Very Short Critical Path Implementation of AES with Direct Logic Gates.- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary.- Compact Stateful Encryption Schemes with Ciphertext Verifiability.- Structured Encryption for Conceptual Graphs.- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability.- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI.- Boomerang Distinguishers for Full HAS-160 Compression Function.- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function.- Annihilators of Fast Discrete Fourier Spectra Attacks.- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher.- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security.- Efficient Secure Primitive for Privacy Preserving Distributed Computations.- Generic Construction of GUC Secure Commitment in the KRK Model.
Series Title: Lecture notes in computer science, 7631
Responsibility: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 ; Goichiro Hanaoka ... [et al.] (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/820789232> # Advances in information and computer security : proceedings
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "820789232" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1186107419#Place/heidelberg> ; # Heidelberg
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> ; # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/surveillance_de_reseaux_systemes_informatiques> ; # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/cryptography_information_theory> ; # CRYPTOGRAPHY (INFORMATION THEORY)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/network_monitoring_computer_systems> ; # NETWORK MONITORING (COMPUTER SYSTEMS)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/datensicherheit_+_datenschutz_betriebssysteme> ; # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> ; # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/kryptographie_informationstheorie> ; # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/cryptographie_theorie_de_l_information> ; # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Topic/kryptoanalyse> ; # Kryptoanalyse
   schema:about <http://dewey.info/class/005.8/e22/ger/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Topic/kryptologie> ; # Kryptologie
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Thing/data_security_+_data_protection_operating_systems> ; # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
   schema:about <http://experiment.worldcat.org/entity/work/data/1186107419#Topic/sicherheitsprotokoll> ; # Sicherheitsprotokoll
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1186107419#Person/hanaoka_goichiro> ; # Goichiro Hanaoka
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1186107419#Meeting/international_workshop_on_security> ; # International Workshop on Security.
   schema:datePublished "2012" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1186107419> ;
   schema:genre "Kongress" ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1186107419#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
   schema:name "Advances in information and computer security : proceedings" ;
   schema:productID "820789232" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/820789232#PublicationEvent/heidelberg_springer_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1186107419#Agent/springer> ; # Springer
   schema:url <http://d-nb.info/1025944712/04> ;
   schema:workExample <http://worldcat.org/isbn/9783642341175> ;
   schema:workExample <http://worldcat.org/isbn/9783642341168> ;
   umbel:isLike <http://d-nb.info/1025944712> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/820789232> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1186107419#Meeting/international_workshop_on_security> # International Workshop on Security.
    a bgn:Meeting, schema:Event ;
   schema:name "International Workshop on Security." ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Person/hanaoka_goichiro> # Goichiro Hanaoka
    a schema:Person ;
   schema:familyName "Hanaoka" ;
   schema:givenName "Goichiro" ;
   schema:name "Goichiro Hanaoka" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/820789232> ; # Advances in information and computer security : proceedings
   schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/cryptographie_theorie_de_l_information> # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    a schema:Thing ;
   schema:name "CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/cryptography_information_theory> # CRYPTOGRAPHY (INFORMATION THEORY)
    a schema:Thing ;
   schema:name "CRYPTOGRAPHY (INFORMATION THEORY)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/data_security_+_data_protection_operating_systems> # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    a schema:Thing ;
   schema:name "DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/datensicherheit_+_datenschutz_betriebssysteme> # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    a schema:Thing ;
   schema:name "DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/kryptographie_informationstheorie> # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    a schema:Thing ;
   schema:name "KRYPTOGRAPHIE (INFORMATIONSTHEORIE)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/network_monitoring_computer_systems> # NETWORK MONITORING (COMPUTER SYSTEMS)
    a schema:Thing ;
   schema:name "NETWORK MONITORING (COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
    a schema:Thing ;
   schema:name "NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    a schema:Thing ;
   schema:name "SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Thing/surveillance_de_reseaux_systemes_informatiques> # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
   schema:name "SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1186107419#Topic/sicherheitsprotokoll> # Sicherheitsprotokoll
    a schema:Intangible ;
   schema:name "Sicherheitsprotokoll" ;
    .

<http://worldcat.org/isbn/9783642341168>
    a schema:ProductModel ;
   schema:isbn "3642341160" ;
   schema:isbn "9783642341168" ;
    .

<http://worldcat.org/isbn/9783642341175>
    a schema:ProductModel ;
   schema:isbn "3642341179" ;
   schema:isbn "9783642341175" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.