skip to content
Information security : 7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings Preview this item
ClosePreview this item
Checking...

Information security : 7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings

Author: Kan Zhang; Yuliang Zheng; LINK (Online service)
Publisher: Berlin : Springer, 2004.
Series: Lecture notes in computer science, 3225.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the 7th International Information Security Conference, ISC 2004, held in Palo Alto, CA, USA, in September 2004. The 36 revised full papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on key management, digital signatures, new algorithms, cryptanalysis, intrusion detection, access control, human  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Print version:
ISC 2004 (2004 : Palo Alto, Calif.).
Information security.
Berlin ; New York : Springer, ©2004
(DLC) 2004112165
(OCoLC)56583356
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Kan Zhang; Yuliang Zheng; LINK (Online service)
ISBN: 3540301445 9783540301448
OCLC Number: 56808214
Notes: Title from title screen (viewed Oct. 8, 2004).
Electronic book available via Springer Link.
Print version originally published in 2004.
Description: 1 online resource (xii, 442 pages) : illustrations.
Contents: Key Management --
Practical Authenticated Key Agreement Using Passwords --
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks --
Storage-Efficient Stateless Group Key Revocation --
Digital Signatures --
Low-Level Ideal Signatures and General Integrity Idealization --
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA --
How to Break and Repair a Universally Composable Signature Functionality --
New Algorithms --
RSA Accumulator Based Broadcast Encryption --
Chameleon Hashing Without Key Exposure --
Radix-r Non-Adjacent Form --
Cryptanalysis --
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor --
Security Analysis of Two Signcryption Schemes --
On The Security of Key Derivation Functions --
Intrusion Detection --
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery --
A Model for the Semantics of Attack Signatures in Misuse Detection Systems --
Detection of Sniffers in an Ethernet Network --
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks --
Securing DBMS: Characterizing and Detecting Query Floods --
Access Control --
An XML-Based Approach to Document Flow Verification --
Model-Checking Access Control Policies --
A Distributed High Assurance Reference Monitor --
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control --
Human Authentication --
Towards Human Interactive Proofs in the Text-Domain --
Image Recognition CAPTCHAs --
Certificate Management --
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model --
Certificate Recommendations to Improve the Robustness of Web of Trust --
Mobile and Ad Hoc Security --
Universally Composable Secure Mobile Agent Computation --
Re-thinking Security in IP Based Micro-Mobility --
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group --
Web Security --
Prevent Online Identity Theft --
Using Network Smart Cards for Secure Online Transactions --
Provable Unlinkability Against Traffic Analysis Already After Steps! --
An Efficient Online Electronic Cash with Unlinkable Exact Payments --
Digital Rights Management --
Modifiable Digital Content Protection in P2P --
Survey on the Technological Aspects of Digital Rights Management --
Detecting Software Theft via Whole Program Path Birthmarks --
Software Security --
Effective Security Requirements Analysis: HAZOP and Use Cases --
The Obfuscation Executive.
Series Title: Lecture notes in computer science, 3225.
Responsibility: Kan Zhang and Yuliang Zheng (eds.).

Abstract:

The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. This team was helped by an even larger number of external reviewers  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/56808214> # Information security : 7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "56808214" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/364575171#Place/berlin> ; # Berlin
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/364575171#Thing/information_security> ; # Information security
    schema:about <http://experiment.worldcat.org/entity/work/data/364575171#Thing/isc> ; # ISC
    schema:about <http://experiment.worldcat.org/entity/work/data/364575171#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/364575171#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/364575171#Topic/computer_security> ; # Computer security
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/364575171#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/364575171#Topic/computers_access_control> ; # Computers--Access control
    schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/3032149108406768780007> ; # Kan Zhang
    schema:contributor <http://viaf.org/viaf/85472982> ; # Yuliang Zheng
    schema:contributor <http://viaf.org/viaf/263941687> ; # LINK (Online service)
    schema:creator <http://experiment.worldcat.org/entity/work/data/364575171#Meeting/isc_2004_7th_2004_palo_alto_ca_usa> ; # ISC 2004 (7th : 2004 : Palo Alto, Ca. USA)
    schema:datePublished "2004" ;
    schema:description "This book constitutes the refereed proceedings of the 7th International Information Security Conference, ISC 2004, held in Palo Alto, CA, USA, in September 2004. The 36 revised full papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on key management, digital signatures, new algorithms, cryptanalysis, intrusion detection, access control, human authentication, certificate management, mobile and ad-hoc security, Web security, digital rights management, and software security."@en ;
    schema:description "Key Management -- Practical Authenticated Key Agreement Using Passwords -- Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks -- Storage-Efficient Stateless Group Key Revocation -- Digital Signatures -- Low-Level Ideal Signatures and General Integrity Idealization -- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA -- How to Break and Repair a Universally Composable Signature Functionality -- New Algorithms -- RSA Accumulator Based Broadcast Encryption -- Chameleon Hashing Without Key Exposure -- Radix-r Non-Adjacent Form -- Cryptanalysis -- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor -- Security Analysis of Two Signcryption Schemes -- On The Security of Key Derivation Functions -- Intrusion Detection -- Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery -- A Model for the Semantics of Attack Signatures in Misuse Detection Systems -- Detection of Sniffers in an Ethernet Network -- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks -- Securing DBMS: Characterizing and Detecting Query Floods -- Access Control -- An XML-Based Approach to Document Flow Verification -- Model-Checking Access Control Policies -- A Distributed High Assurance Reference Monitor -- Using Mediated Identity-Based Cryptography to Support Role-Based Access Control -- Human Authentication -- Towards Human Interactive Proofs in the Text-Domain -- Image Recognition CAPTCHAs -- Certificate Management -- A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model -- Certificate Recommendations to Improve the Robustness of Web of Trust -- Mobile and Ad Hoc Security -- Universally Composable Secure Mobile Agent Computation -- Re-thinking Security in IP Based Micro-Mobility -- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group -- Web Security -- Prevent Online Identity Theft -- Using Network Smart Cards for Secure Online Transactions -- Provable Unlinkability Against Traffic Analysis Already After Steps! -- An Efficient Online Electronic Cash with Unlinkable Exact Payments -- Digital Rights Management -- Modifiable Digital Content Protection in P2P -- Survey on the Technological Aspects of Digital Rights Management -- Detecting Software Theft via Whole Program Path Birthmarks -- Software Security -- Effective Security Requirements Analysis: HAZOP and Use Cases -- The Obfuscation Executive."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/364575171> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/364575171#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/56583356> ;
    schema:name "Information security : 7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings"@en ;
    schema:productID "56808214" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/56808214#PublicationEvent/berlin_springer_2004> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/364575171#Agent/springer> ; # Springer
    schema:url <http://proxy.library.carleton.ca/login?url=http://dx.doi.org/10.1007/b100936> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=144509> ;
    schema:url <http://www.springerlink.com/link.asp?id=7yhntwvl2wu3> ;
    schema:url <http://dx.doi.org/10.1007/b100936> ;
    schema:url <http://link.springer.com/10.1007/b100936> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/11325864> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3087217> ;
    schema:workExample <http://worldcat.org/isbn/9783540301448> ;
    schema:workExample <http://dx.doi.org/10.1007/b100936> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/56808214> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/364575171#Meeting/isc_2004_7th_2004_palo_alto_ca_usa> # ISC 2004 (7th : 2004 : Palo Alto, Ca. USA)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/364575171#Place/palo_alto_ca_usa> ; # Palo Alto, Ca. USA)
    schema:name "ISC 2004 (7th : 2004 : Palo Alto, Ca. USA)" ;
    .

<http://experiment.worldcat.org/entity/work/data/364575171#Place/palo_alto_ca_usa> # Palo Alto, Ca. USA)
    a schema:Place ;
    schema:name "Palo Alto, Ca. USA)" ;
    .

<http://experiment.worldcat.org/entity/work/data/364575171#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/56808214> ; # Information security : 7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/364575171#Thing/information_security> # Information security
    a schema:Thing ;
    schema:name "Information security" ;
    .

<http://experiment.worldcat.org/entity/work/data/364575171#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/364575171#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/364575171#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://viaf.org/viaf/263941687> # LINK (Online service)
    a schema:Organization ;
    schema:name "LINK (Online service)" ;
    .

<http://viaf.org/viaf/3032149108406768780007> # Kan Zhang
    a schema:Person ;
    schema:familyName "Zhang" ;
    schema:givenName "Kan" ;
    schema:name "Kan Zhang" ;
    .

<http://viaf.org/viaf/85472982> # Yuliang Zheng
    a schema:Person ;
    schema:birthDate "1962" ;
    schema:familyName "Zheng" ;
    schema:givenName "Yuliang" ;
    schema:name "Yuliang Zheng" ;
    .

<http://worldcat.org/isbn/9783540301448>
    a schema:ProductModel ;
    schema:isbn "3540301445" ;
    schema:isbn "9783540301448" ;
    .

<http://www.worldcat.org/oclc/56583356>
    a schema:CreativeWork ;
    rdfs:label "Information security." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/56808214> ; # Information security : 7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings
    .

<http://www.worldcat.org/title/-/oclc/56808214>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/56808214> ; # Information security : 7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings
    schema:dateModified "2018-07-13" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.