skip to content
Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers Preview this item
ClosePreview this item

Information security and cryptology--ICISC 2004 : 7th international conference, Seoul, Korea, December 2-3, 2004 : revised selected papers

Author: Choonsik Park; Seongtaek Chee
Publisher: Berlin ; New York : Springer, ©2005.
Series: Lecture notes in computer science, 3506.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
"The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communication of Korea."
Getting this item's online copy... Getting this item's online copy...

Find a copy in the library

Getting this item's location and availability... Getting this item's location and availability...

WorldCat

Find it in libraries globally
Worldwide libraries own this item

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Congrès
Additional Physical Format: Print version:
ICISC 2004 (2004 : Seoul, Korea).
Information security and cryptology--ICISC 2004.
Berlin ; New York : Springer, ©2005
(DLC) 2005926827
(OCoLC)60613547
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Choonsik Park; Seongtaek Chee
ISBN: 3540262261 9783540262268 9783540320838 3540320830
OCLC Number: 62074728
Description: 1 online resource (xiv, 490 pages) : illustrations.
Contents: Invited Talks.- Security by, and for, Converged Mobile Devices.- Security for Ubiquitous Computing.- Block Cipher and Stream Cipher.- Algebraic Attacks on Combiners with Memory and Several Outputs.- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.- Dragon: A Fast Word Based Stream Cipher.- Public Key Cryptosystem.- An Efficient and Verifiable Solution to the Millionaire Problem.- All in the XL Family: Theory and Practice.- Efficient Broadcast Encryption Using Multiple Interpolation Methods.- On Private Scalar Product Computation for Privacy-Preserving Data Mining.- PKI and Related Implementation.- Separable Implicit Certificate Revocation.- Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation.- Improvement on Ha-Moon Randomized Exponentiation Algorithm.- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.- Digital Signature.- On Subliminal Channels in Deterministic Signature Schemes.- Threshold Entrusted Undeniable Signature.- On the Security Models of (Threshold) Ring Signature Schemes.- Identity Based Threshold Ring Signature.- Batch Verifications with ID-Based Signatures.- Elliptic Curve Cryptosystem.- A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method.- Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations.- New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method.- Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Provable Security and Primitives.- On the Pseudorandomness of a Modification of KASUMI Type Permutations.- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model.- Padding Oracle Attacks on Multiple Modes of Operation.- An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.- Network Security.- Identity-Based Access Control for Ad Hoc Groups.- Mobile Mixing.- A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems.- ADWICE - Anomaly Detection with Real-Time Incremental Clustering.- Steganography.- Steganography for Executables and Code Transformation Signatures.- On Security Notions for Steganalysis.- A Block Oriented Fingerprinting Scheme in Relational Database.- Biometrics.- A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis.- Profile-Based 3D Face Registration and Recognition.
Series Title: Lecture notes in computer science, 3506.
Other Titles: ICISC 2004
Responsibility: Choonsik Park, Seongtaek Chee (eds.).

Abstract:

Constitutes the refereed postproceedings of the 7th International Conference on Information Security and Cryptology, ICISC 2004, held in Seoul, Korea in December 2004. This work presents papers that  Read more...
Retrieving notes about this item Retrieving notes about this item

Reviews

User-contributed reviews

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.