skip to content
Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings Preview this item
ClosePreview this item
Checking...

Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings

Author: Jianying Zhou; Javier López; Robert H Deng
Publisher: Berlin ; New York : Springer, 2005.
Series: Lecture notes in computer science, 3650.
Edition/Format:   Print book : Document : Conference publication   Computer File : EnglishView all editions and formats
Database:WorldCat
Summary:

Constitutes the refereed proceedings of the 8th International Information Security Conference, ISC 2005, held in Singapore in September 2005. The papers in this book are organized in topical sections  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Conference papers and proceedings
Singapur (2005)
Singapur (2005))
Congresses
Congrès
Material Type: Conference publication, Document, Internet resource
Document Type: Book, Computer File, Internet Resource
All Authors / Contributors: Jianying Zhou; Javier López; Robert H Deng
ISBN: 354029001X 9783540290018
OCLC Number: 61714951
Description: xii, 516 pages : illustrations ; 24 cm.
Contents: Network Security I.- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks.- SVision: A Network Host-Centered Anomaly Visualization Technique.- Trust & Privacy.- Time-Based Release of Confidential Information in Hierarchical Settings.- "Trust Engineering:" From Requirements to System Design and Maintenance - A Working National Lottery System Experience.- A Privacy Preserving Rental System.- Key Management & Protocols.- Constant Round Dynamic Group Key Agreement.- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design.- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms.- On the Notion of Statistical Security in Simulatability Definitions.- Public Key Encryption & Signature.- Certificateless Public Key Encryption Without Pairing.- Tracing-by-Linking Group Signatures.- Chaum's Designated Confirmer Signature Revisited.- Network Security II.- gore: Routing-Assisted Defense Against DDoS Attacks.- IPSec Support in NAT-PT Scenario for IPv6 Transition.- Signcryption.- Hybrid Signcryption Schemes with Outsider Security.- Analysis and Improvement of a Signcryption Scheme with Key Privacy.- Efficient and Proactive Threshold Signcryption.- Crypto Algorithm & Analysis.- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?.- Hardware Architecture and Cost Estimates for Breaking SHA-1.- On the Security of Tweakable Modes of Operation: TBC and TAE.- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm.- Cryptography.- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.- An Oblivious Transfer Protocol with Log-Squared Communication.- Applications.- Electronic Voting: Starting Over?.- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System.- Universally Composable Time-Stamping Schemes with Audit.- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.- Software Security.- Building a Cryptovirus Using Microsoft's Cryptographic API.- On the Security of the WinRAR Encryption Method.- Towards Better Software Tamper Resistance.- Authorization & Access Control.- Device-Enabled Authorization in the Grey System.- Evaluating Access Control Policies Through Model Checking.- A Cryptographic Solution for General Access Control.- Student Papers.- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.- A Formal Definition for Trust in Distributed Systems.- A Practical Voting Scheme with Receipts.- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation.- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Series Title: Lecture notes in computer science, 3650.
Responsibility: Jianying Zhou [and others] (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/61714951> # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
   library:oclcnum "61714951" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/895232546#Place/berlin> ; # Berlin
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/computer_security> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/computersicherheit> ; # Computersicherheit
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/kryptosystem> ; # Kryptosystem
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/securite_des_reseaux> ; # Sécurité des réseaux
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/controle_d_acces> ; # Contrôle d'accès
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/zugriffskontrolle> ; # Zugriffskontrolle
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/rechnernetz> ; # Rechnernetz
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/computers_access_control> ; # Computers--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/elektronische_unterschrift> ; # Elektronische Unterschrift
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/ordinateur> ; # Ordinateur
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/authentifikation> ; # Authentifikation
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/securite_informatique_congres> ; # Sécurité informatique--Congrès
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/securite_informatique> ; # Sécurité informatique
   schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/datensicherung> ; # Datensicherung
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/ordinateurs_acces_controle> ; # Ordinateurs--Accès--Contrôle
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/eindringerkennung> ; # Eindringerkennung
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/cryptographie_informatique> ; # Cryptographie (Informatique)
   schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/ordinateurs_acces_controle_congres> ; # Ordinateurs--Accès--Contrôle--Congrès
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/50279185> ; # Jianying Zhou
   schema:contributor <http://experiment.worldcat.org/entity/work/data/895232546#Person/deng_robert_h> ; # Robert H. Deng
   schema:contributor <http://experiment.worldcat.org/entity/work/data/895232546#Person/lopez_javier> ; # Javier López
   schema:creator <http://experiment.worldcat.org/entity/work/data/895232546#Meeting/isc_conference_information_security_8th_2005_singapore> ; # ISC (Conference : Information security) (8th : 2005 : Singapore)
   schema:datePublished "2005" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/895232546> ;
   schema:genre "Singapur (2005))"@en ;
   schema:genre "Kongress"@en ;
   schema:genre "Conference publication"@en ;
   schema:genre "Singapur (2005)"@en ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
   schema:name "Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings"@en ;
   schema:productID "61714951" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/61714951#PublicationEvent/berlin_new_york_springer_2005> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/895232546#Agent/springer> ; # Springer
   schema:url <http://link.springer-ny.com/link/service/series/0558/tocs/t3650.htm> ;
   schema:url <http://swbplus.bsz-bw.de/bsz120536463vor.htm> ;
   schema:url <http://swbplus.bsz-bw.de/bsz120536463inh.htm> ;
   schema:url <http://catdir.loc.gov/catdir/toc/fy0609/2005932344.html> ;
   schema:url <http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3650> ;
   schema:url <http://swbplus.bsz-bw.de/bsz120536463cov.htm> ;
   schema:url <http://mutex.gmu.edu/login?url=http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3650> ;
   schema:url <http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3650> ;
   schema:url <http://dx.doi.org/10.1007/11556992> ;
   schema:workExample <http://worldcat.org/isbn/9783540290018> ;
   umbel:isLike <http://d-nb.info/976062208> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/61714951> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
   schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Meeting/isc_conference_information_security_8th_2005_singapore> # ISC (Conference : Information security) (8th : 2005 : Singapore)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/895232546#Place/singapore> ; # Singapore)
   schema:name "ISC (Conference : Information security) (8th : 2005 : Singapore)" ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Person/deng_robert_h> # Robert H. Deng
    a schema:Person ;
   schema:familyName "Deng" ;
   schema:givenName "Robert H." ;
   schema:name "Robert H. Deng" ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Person/lopez_javier> # Javier López
    a schema:Person ;
   schema:familyName "López" ;
   schema:givenName "Javier" ;
   schema:name "Javier López" ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/controle_d_acces> # Contrôle d'accès
    a schema:Intangible ;
   schema:name "Contrôle d'accès"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/cryptographie_informatique> # Cryptographie (Informatique)
    a schema:Intangible ;
   schema:name "Cryptographie (Informatique)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/elektronische_unterschrift> # Elektronische Unterschrift
    a schema:Intangible ;
   schema:name "Elektronische Unterschrift"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/ordinateurs_acces_controle> # Ordinateurs--Accès--Contrôle
    a schema:Intangible ;
   schema:name "Ordinateurs--Accès--Contrôle"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/ordinateurs_acces_controle_congres> # Ordinateurs--Accès--Contrôle--Congrès
    a schema:Intangible ;
   schema:name "Ordinateurs--Accès--Contrôle--Congrès"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/securite_des_reseaux> # Sécurité des réseaux
    a schema:Intangible ;
   schema:name "Sécurité des réseaux"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
   schema:name "Sécurité informatique"@en ;
   schema:name "Sécurité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/securite_informatique_congres> # Sécurité informatique--Congrès
    a schema:Intangible ;
   schema:name "Sécurité informatique--Congrès"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://mutex.gmu.edu/login?url=http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3650>
   rdfs:comment "Electronic resource available to Mason students, faculty, staff, and onsite patrons." ;
    .

<http://viaf.org/viaf/50279185> # Jianying Zhou
    a schema:Person ;
   schema:familyName "Zhou" ;
   schema:givenName "Jianying" ;
   schema:name "Jianying Zhou" ;
    .

<http://worldcat.org/isbn/9783540290018>
    a schema:ProductModel ;
   schema:isbn "354029001X" ;
   schema:isbn "9783540290018" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/61714951> ; # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
   schema:issn "0302-9743" ;
   schema:name "Lecture notes in computer science ;" ;
   schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/61714951>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/61714951> ; # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
   schema:dateModified "2017-09-04" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.