skip to content
Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings Preview this item
ClosePreview this item
Checking...

Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings

Author: Jianying Zhou
Publisher: Berlin ; New York : Springer, 2005.
Series: Lecture notes in computer science, 3650.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
"This volume contains the proceedings of the 8th International Information Security Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005."
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Kongress
Singapur (2005))
Congresses
Congrès
Additional Physical Format: Print version:
ISC 2005 (2005 : Singapore).
Information security.
Berlin ; New York : Springer, 2005
(DLC) 2005932344
(OCoLC)61714951
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jianying Zhou
ISBN: 9783540319306 3540319301 354029001X 9783540290018
OCLC Number: 262681849
Description: 1 online resource (xii, 516 pages) : illustrations.
Contents: Network Security I --
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks --
SVision: A Network Host-Centered Anomaly Visualization Technique --
Trust & Privacy --
Time-Based Release of Confidential Information in Hierarchical Settings --
?Trust Engineering:? From Requirements to System Design and Maintenance {u2013} A Working National Lottery System Experience --
A Privacy Preserving Rental System --
Key Management & Protocols --
Constant Round Dynamic Group Key Agreement --
A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design --
ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms --
On the Notion of Statistical Security in Simulatability Definitions --
Public Key Encryption & Signature --
Certificateless Public Key Encryption Without Pairing --
Tracing-by-Linking Group Signatures --
Chaum{u2019}s Designated Confirmer Signature Revisited --
Network Security II --
gore: Routing-Assisted Defense Against DDoS Attacks --
IPSec Support in NAT-PT Scenario for IPv6 Transition --
Signcryption --
Hybrid Signcryption Schemes with Outsider Security --
Analysis and Improvement of a Signcryption Scheme with Key Privacy --
Efficient and Proactive Threshold Signcryption --
Crypto Algorithm & Analysis --
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? --
Hardware Architecture and Cost Estimates for Breaking SHA-1 --
On the Security of Tweakable Modes of Operation: TBC and TAE --
A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm --
Cryptography --
Compatible Ideal Contrast Visual Cryptography Schemes with Reversing --
An Oblivious Transfer Protocol with Log-Squared Communication --
Applications --
Electronic Voting: Starting Over? --
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System --
Universally Composable Time-Stamping Schemes with Audit --
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption --
Software Security --
Building a Cryptovirus Using Microsoft{u2019}s Cryptographic API --
On the Security of the WinRAR Encryption Method --
Towards Better Software Tamper Resistance --
Authorization & Access Control --
Device-Enabled Authorization in the Grey System --
Evaluating Access Control Policies Through Model Checking --
A Cryptographic Solution for General Access Control --
Student Papers --
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting --
A Formal Definition for Trust in Distributed Systems --
A Practical Voting Scheme with Receipts --
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation --
Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Series Title: Lecture notes in computer science, 3650.
Other Titles: ISC 2005
Responsibility: Jianying Zhou [and others] (eds.).

Abstract:

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. Advised by the ISC Steering  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/262681849> # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "262681849" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/4926647105#Place/berlin> ; # Berlin
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computers_access_control> ; # Computers--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/kryptosystem> ; # Kryptosystem
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/zugriffskontrolle> ; # Zugriffskontrolle
    schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/informatique> ; # Informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/rechnernetz> ; # Rechnernetz
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/securite_des_reseaux> ; # Sécurité des réseaux
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/ordinateur> ; # Ordinateur
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/ordinateurs_acces_controle> ; # Ordinateurs--Accès--Contrôle
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/authentifikation> ; # Authentifikation
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/elektronische_unterschrift> ; # Elektronische Unterschrift
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/cryptographie_informatique> ; # Cryptographie (Informatique)
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/controle_d_acces> ; # Contrôle d'accès
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/eindringerkennung> ; # Eindringerkennung
    schema:about <http://experiment.worldcat.org/entity/work/data/4926647105#Topic/datensicherung> ; # Datensicherung
    schema:alternateName "ISC 2005" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/50279185> ; # Jianying Zhou
    schema:creator <http://experiment.worldcat.org/entity/work/data/4926647105#Meeting/isc_conference_information_security_8th_2005_singapore> ; # ISC (Conference : Information security) (8th : 2005 : Singapore)
    schema:datePublished "2005" ;
    schema:description "Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- ?Trust Engineering:? From Requirements to System Design and Maintenance {u2013} A Working National Lottery System Experience -- A Privacy Preserving Rental System -- Key Management & Protocols -- Constant Round Dynamic Group Key Agreement -- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design -- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms -- On the Notion of Statistical Security in Simulatability Definitions -- Public Key Encryption & Signature -- Certificateless Public Key Encryption Without Pairing -- Tracing-by-Linking Group Signatures -- Chaum{u2019}s Designated Confirmer Signature Revisited -- Network Security II -- gore: Routing-Assisted Defense Against DDoS Attacks -- IPSec Support in NAT-PT Scenario for IPv6 Transition -- Signcryption -- Hybrid Signcryption Schemes with Outsider Security -- Analysis and Improvement of a Signcryption Scheme with Key Privacy -- Efficient and Proactive Threshold Signcryption -- Crypto Algorithm & Analysis -- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? -- Hardware Architecture and Cost Estimates for Breaking SHA-1 -- On the Security of Tweakable Modes of Operation: TBC and TAE -- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm -- Cryptography -- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing -- An Oblivious Transfer Protocol with Log-Squared Communication -- Applications -- Electronic Voting: Starting Over? -- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System -- Universally Composable Time-Stamping Schemes with Audit -- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption -- Software Security -- Building a Cryptovirus Using Microsoft{u2019}s Cryptographic API -- On the Security of the WinRAR Encryption Method -- Towards Better Software Tamper Resistance -- Authorization & Access Control -- Device-Enabled Authorization in the Grey System -- Evaluating Access Control Policies Through Model Checking -- A Cryptographic Solution for General Access Control -- Student Papers -- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting -- A Formal Definition for Trust in Distributed Systems -- A Practical Voting Scheme with Receipts -- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation -- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models."@en ;
    schema:description ""This volume contains the proceedings of the 8th International Information Security Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005.""@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4926647105> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:genre "Kongress"@en ;
    schema:genre "Singapur (2005))"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/61714951> ;
    schema:name "Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings"@en ;
    schema:productID "262681849" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/262681849#PublicationEvent/berlin_new_york_springer_2005> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/4926647105#Agent/springer> ; # Springer
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3067669> ;
    schema:url <http://link.springer.com/10.1007/11556992> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/book/10.1007/11556992> ;
    schema:url <http://libproxy.uwyo.edu/login/?url=http://link.springer.com/10.1007/11556992> ;
    schema:url <http://libweb.ben.edu/login?source=opac&url=http://dx.doi.org/10.1007/11556992> ;
    schema:url <http://deposit.ddb.de/cgi-bin/dokserv?id=2672132&prov=M&dok_var=1&dok_ext=htm> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=183365> ;
    schema:url <http://site.ebrary.com/id/10528555> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/11556992> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=book&isbn=978-3-540-29001-8> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-540-29001-8> ;
    schema:url <http://dx.doi.org/10.1007/11556992> ;
    schema:url <http://libproxy.uwyo.edu/login/?url=http://dx.doi.org/10.1007/11556992> ;
    schema:url <http://www.myilibrary.com?id=140427> ;
    schema:url <http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3650> ;
    schema:url <http://gate.lib.buffalo.edu/login?url=https://link.springer.com/book/10.1007/11556992> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-540-29001-8> ;
    schema:url <http://www.springerlink.com/link.asp?id=c23m4a0pd453> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/11556992> ;
    schema:workExample <http://worldcat.org/isbn/9783540319306> ;
    schema:workExample <http://worldcat.org/isbn/9783540290018> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/262681849> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Meeting/isc_conference_information_security_8th_2005_singapore> # ISC (Conference : Information security) (8th : 2005 : Singapore)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/4926647105#Place/singapore> ; # Singapore)
    schema:name "ISC (Conference : Information security) (8th : 2005 : Singapore)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/controle_d_acces> # Contrôle d'accès
    a schema:Intangible ;
    schema:name "Contrôle d'accès"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/cryptographie_informatique> # Cryptographie (Informatique)
    a schema:Intangible ;
    schema:name "Cryptographie (Informatique)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/eindringerkennung> # Eindringerkennung
    a schema:Intangible ;
    schema:name "Eindringerkennung"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/elektronische_unterschrift> # Elektronische Unterschrift
    a schema:Intangible ;
    schema:name "Elektronische Unterschrift"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/ordinateurs_acces_controle> # Ordinateurs--Accès--Contrôle
    a schema:Intangible ;
    schema:name "Ordinateurs--Accès--Contrôle"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/securite_des_reseaux> # Sécurité des réseaux
    a schema:Intangible ;
    schema:name "Sécurité des réseaux"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@en ;
    schema:name "Sécurité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/4926647105#Topic/zugriffskontrolle> # Zugriffskontrolle
    a schema:Intangible ;
    schema:name "Zugriffskontrolle"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://libweb.ben.edu/login?source=opac&url=http://dx.doi.org/10.1007/11556992>
    rdfs:comment "(access limited to Benedictine University patrons)" ;
    .

<http://viaf.org/viaf/50279185> # Jianying Zhou
    a schema:Person ;
    schema:familyName "Zhou" ;
    schema:givenName "Jianying" ;
    schema:name "Jianying Zhou" ;
    .

<http://worldcat.org/isbn/9783540290018>
    a schema:ProductModel ;
    schema:isbn "354029001X" ;
    schema:isbn "9783540290018" ;
    .

<http://worldcat.org/isbn/9783540319306>
    a schema:ProductModel ;
    schema:isbn "3540319301" ;
    schema:isbn "9783540319306" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/262681849> ; # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/oclc/61714951>
    a schema:CreativeWork ;
    rdfs:label "Information security." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/262681849> ; # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
    .

<http://www.worldcat.org/title/-/oclc/262681849>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/262681849> ; # Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
    schema:dateModified "2018-12-03" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.