skip to content
Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings Preview this item
ClosePreview this item
Checking...

Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings

Author: Jianying Zhou; Javier López; Robert H Deng
Publisher: Berlin ; New York : Springer, 2005.
Series: Lecture notes in computer science, 3650.
Edition/Format:   Print book : Document : Conference publication   Computer File : EnglishView all editions and formats
Summary:

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. Advised by the ISC Steering  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Conference papers and proceedings
Singapur (2005)
Singapur (2005))
Congresses
Congrès
Material Type: Conference publication, Document, Internet resource
Document Type: Book, Computer File, Internet Resource
All Authors / Contributors: Jianying Zhou; Javier López; Robert H Deng
ISBN: 354029001X 9783540290018 9783540319306 3540319301
OCLC Number: 61714951
Description: xii, 516 pages : illustrations ; 24 cm.
Contents: Network Security I.- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks.- SVision: A Network Host-Centered Anomaly Visualization Technique.- Trust & Privacy.- Time-Based Release of Confidential Information in Hierarchical Settings.- "Trust Engineering:" From Requirements to System Design and Maintenance - A Working National Lottery System Experience.- A Privacy Preserving Rental System.- Key Management & Protocols.- Constant Round Dynamic Group Key Agreement.- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design.- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms.- On the Notion of Statistical Security in Simulatability Definitions.- Public Key Encryption & Signature.- Certificateless Public Key Encryption Without Pairing.- Tracing-by-Linking Group Signatures.- Chaum's Designated Confirmer Signature Revisited.- Network Security II.- gore: Routing-Assisted Defense Against DDoS Attacks.- IPSec Support in NAT-PT Scenario for IPv6 Transition.- Signcryption.- Hybrid Signcryption Schemes with Outsider Security.- Analysis and Improvement of a Signcryption Scheme with Key Privacy.- Efficient and Proactive Threshold Signcryption.- Crypto Algorithm & Analysis.- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?.- Hardware Architecture and Cost Estimates for Breaking SHA-1.- On the Security of Tweakable Modes of Operation: TBC and TAE.- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm.- Cryptography.- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.- An Oblivious Transfer Protocol with Log-Squared Communication.- Applications.- Electronic Voting: Starting Over?.- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System.- Universally Composable Time-Stamping Schemes with Audit.- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.- Software Security.- Building a Cryptovirus Using Microsoft's Cryptographic API.- On the Security of the WinRAR Encryption Method.- Towards Better Software Tamper Resistance.- Authorization & Access Control.- Device-Enabled Authorization in the Grey System.- Evaluating Access Control Policies Through Model Checking.- A Cryptographic Solution for General Access Control.- Student Papers.- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.- A Formal Definition for Trust in Distributed Systems.- A Practical Voting Scheme with Receipts.- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation.- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Series Title: Lecture notes in computer science, 3650.
Responsibility: Jianying Zhou [and others] (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/61714951> # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "61714951" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/4926647105#Place/berlin> ; # Berlin
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/authentifikation> ; # Authentifikation
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/controle_d_acces> ; # Contrôle d'accès
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/ordinateurs_acces_controle> ; # Ordinateurs--Accès--Contrôle
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/eindringerkennung> ; # Eindringerkennung
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/cryptographie_informatique> ; # Cryptographie (Informatique)
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/ordinateur> ; # Ordinateur
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/securite_des_reseaux> ; # Sécurité des réseaux
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/zugriffskontrolle> ; # Zugriffskontrolle
    schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/rechnernetz> ; # Rechnernetz
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/elektronische_unterschrift> ; # Elektronische Unterschrift
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/kryptosystem> ; # Kryptosystem
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computers_access_control> ; # Computers--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/datensicherung> ; # Datensicherung
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/50279185> ; # Jianying Zhou
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4926647105#Person/lopez_javier> ; # Javier López
    schema:contributor <http://viaf.org/viaf/74780855> ; # Robert H. Deng
    schema:creator <http://experiment.worldcat.org/entity/work/data/4926647105#Meeting/isc_conference_information_security_8th_2005_singapore> ; # ISC (Conference : Information security) (8th : 2005 : Singapore)
    schema:datePublished "2005" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4926647105> ;
    schema:genre "Singapur (2005))"@en ;
    schema:genre "Kongress"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Singapur (2005)"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:name "Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings"@en ;
    schema:productID "61714951" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/61714951#PublicationEvent/berlin_new_york_springer_2005> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/4926647105#Agent/springer> ; # Springer
    schema:url <http://link.springer-ny.com/link/service/series/0558/tocs/t3650.htm> ;
    schema:url <http://swbplus.bsz-bw.de/bsz120536463vor.htm> ;
    schema:url <http://swbplus.bsz-bw.de/bsz120536463inh.htm> ;
    schema:url <http://catdir.loc.gov/catdir/toc/fy0609/2005932344.html> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3650> ;
    schema:url <http://swbplus.bsz-bw.de/bsz120536463cov.htm> ;
    schema:url <http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3650> ;
    schema:url <http://dx.doi.org/10.1007/11556992> ;
    schema:workExample <http://worldcat.org/isbn/9783540319306> ;
    schema:workExample <http://worldcat.org/isbn/9783540290018> ;
    umbel:isLike <http://d-nb.info/976062208> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/61714951> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Meeting/isc_conference_information_security_8th_2005_singapore> # ISC (Conference : Information security) (8th : 2005 : Singapore)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/4926647105#Place/singapore> ; # Singapore)
    schema:name "ISC (Conference : Information security) (8th : 2005 : Singapore)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Person/lopez_javier> # Javier López
    a schema:Person ;
    schema:familyName "López" ;
    schema:givenName "Javier" ;
    schema:name "Javier López" ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/controle_d_acces> # Contrôle d'accès
    a schema:Intangible ;
    schema:name "Contrôle d'accès"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/cryptographie_informatique> # Cryptographie (Informatique)
    a schema:Intangible ;
    schema:name "Cryptographie (Informatique)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/eindringerkennung> # Eindringerkennung
    a schema:Intangible ;
    schema:name "Eindringerkennung"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/elektronische_unterschrift> # Elektronische Unterschrift
    a schema:Intangible ;
    schema:name "Elektronische Unterschrift"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/ordinateurs_acces_controle> # Ordinateurs--Accès--Contrôle
    a schema:Intangible ;
    schema:name "Ordinateurs--Accès--Contrôle"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/securite_des_reseaux> # Sécurité des réseaux
    a schema:Intangible ;
    schema:name "Sécurité des réseaux"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@en ;
    schema:name "Sécurité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/zugriffskontrolle> # Zugriffskontrolle
    a schema:Intangible ;
    schema:name "Zugriffskontrolle"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3650>
    rdfs:comment "Electronic resource available to Mason students, faculty, staff, and onsite patrons." ;
    rdfs:comment "Restricted to SpringerLink subscribers" ;
    .

<http://viaf.org/viaf/50279185> # Jianying Zhou
    a schema:Person ;
    schema:familyName "Zhou" ;
    schema:givenName "Jianying" ;
    schema:name "Jianying Zhou" ;
    .

<http://viaf.org/viaf/74780855> # Robert H. Deng
    a schema:Person ;
    schema:familyName "Deng" ;
    schema:givenName "Robert H." ;
    schema:name "Robert H. Deng" ;
    .

<http://worldcat.org/isbn/9783540290018>
    a schema:ProductModel ;
    schema:isbn "354029001X" ;
    schema:isbn "9783540290018" ;
    .

<http://worldcat.org/isbn/9783540319306>
    a schema:ProductModel ;
    schema:isbn "3540319301" ;
    schema:isbn "9783540319306" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/61714951> ; # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/61714951>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/61714951> ; # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
    schema:dateModified "2018-05-16" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.