skip to content
Information Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Preview this item
ClosePreview this item
Checking...

Information Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

Author: Dong Ho Won; Seungjoo Kim
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Series: Lecture notes in computer science, 3935.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Publication:Springer e-books
Summary:
This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005, held in Seoul, Korea in December 2005. The 32 revised full papers presented together with two invited talks have gone through two rounds of reviewing and improvement and were selected from 192 submissions. The papers are organized in topical sections on key management  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Congrès
Additional Physical Format: Printed edition:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Dong Ho Won; Seungjoo Kim
ISBN: 9783540333555 354033355X 9783540333548 3540333541
OCLC Number: 1006412024
Description: 1 online resource (XIV, 458 pages Also available online.) : online resource
Contents: Invited Talks --
National Security, Forensics and Mobile Communications --
Information Security as Interdisciplinary Science Based on Ethics --
Key Management and Distributed Cryptography --
A Timed-Release Key Management Scheme for Backward Recovery --
Property-Based Broadcast Encryption for Multi-level Security Policies --
Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption --
Authentication and Biometrics --
An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image --
Trust Management for Resilient Wireless Sensor Networks --
Improvements to Mitchell's Remote User Authentication Protocol --
Efficient Authenticators with Application to Key Exchange --
Provable Security and Primitives --
Benes and Butterfly Schemes Revisited --
Relative Doubling Attack Against Montgomery Ladder --
Improved Collision Attack on MD4 with Probability Almost 1 --
Finding Collision on 45-Step HAS-160 --
System/Network Security --
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks --
The Dilemma of Covert Channels Searching --
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks --
Foundations of Attack Trees --
Block/Stream Ciphers (I) --
An Algebraic Masking Method to Protect AES Against Power Attacks --
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes --
Integral Cryptanalysis of Reduced FOX Block Cipher --
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components --
Block/Stream Ciphers (II) --
Cryptanalysis of Sfinks --
Weaknesses of COSvd (2,128) Stream Cipher --
Expanding Weak PRF with Small Key Size --
On Linear Systems of Equations with Distinct Variables and Small Block Size --
Efficient Implementations --
An FPGA Implementation of CCM Mode Using AES --
New Architecture for Multiplication in GF(2 m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography --
An Efficient Design of CCMP for Robust Security Network --
Digital Rights Management --
Software-Based Copy Protection for Temporal Media During Dissemination and Playback --
Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme --
Public Key Cryptography --
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms --
An Efficient Static Blind Ring Signature Scheme --
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model --
Yet Another Forward Secure Signature from Bilinear Pairings.
Series Title: Lecture notes in computer science, 3935.
Responsibility: edited by Dong Ho Won, Seungjoo Kim.

Abstract:

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005, held in Seoul, Korea in December 2005. The 32 revised full papers presented together with two invited talks have gone through two rounds of reviewing and improvement and were selected from 192 submissions. The papers are organized in topical sections on key management and distributed cryptography, authentication and biometrics, provable security and primitives, system and network security, block ciphers and stream ciphers, efficient implementations, digital rights management, and public key cryptography.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1006412024> # Information Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "1006412024" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/computer_science> ; # Computer science
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/operating_systems_computers> ; # Operating systems (Computers)
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/information_systems> ; # Information Systems
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/computational_complexity> ; # Computational complexity
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/computer_software> ; # Computer software
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://experiment.worldcat.org/entity/work/data/915357814#Topic/cryptographie> ; # Cryptographie
    schema:bookFormat schema:EBook ;
    schema:datePublished "2006" ;
    schema:description "Invited Talks -- National Security, Forensics and Mobile Communications -- Information Security as Interdisciplinary Science Based on Ethics -- Key Management and Distributed Cryptography -- A Timed-Release Key Management Scheme for Backward Recovery -- Property-Based Broadcast Encryption for Multi-level Security Policies -- Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption -- Authentication and Biometrics -- An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image -- Trust Management for Resilient Wireless Sensor Networks -- Improvements to Mitchell's Remote User Authentication Protocol -- Efficient Authenticators with Application to Key Exchange -- Provable Security and Primitives -- Benes and Butterfly Schemes Revisited -- Relative Doubling Attack Against Montgomery Ladder -- Improved Collision Attack on MD4 with Probability Almost 1 -- Finding Collision on 45-Step HAS-160 -- System/Network Security -- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks -- The Dilemma of Covert Channels Searching -- A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks -- Foundations of Attack Trees -- Block/Stream Ciphers (I) -- An Algebraic Masking Method to Protect AES Against Power Attacks -- Characterisations of Extended Resiliency and Extended Immunity of S-Boxes -- Integral Cryptanalysis of Reduced FOX Block Cipher -- Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components -- Block/Stream Ciphers (II) -- Cryptanalysis of Sfinks -- Weaknesses of COSvd (2,128) Stream Cipher -- Expanding Weak PRF with Small Key Size -- On Linear Systems of Equations with Distinct Variables and Small Block Size -- Efficient Implementations -- An FPGA Implementation of CCM Mode Using AES -- New Architecture for Multiplication in GF(2 m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography -- An Efficient Design of CCMP for Robust Security Network -- Digital Rights Management -- Software-Based Copy Protection for Temporal Media During Dissemination and Playback -- Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme -- Public Key Cryptography -- Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms -- An Efficient Static Blind Ring Signature Scheme -- Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model -- Yet Another Forward Secure Signature from Bilinear Pairings."@en ;
    schema:description "This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005, held in Seoul, Korea in December 2005. The 32 revised full papers presented together with two invited talks have gone through two rounds of reviewing and improvement and were selected from 192 submissions. The papers are organized in topical sections on key management and distributed cryptography, authentication and biometrics, provable security and primitives, system and network security, block ciphers and stream ciphers, efficient implementations, digital rights management, and public key cryptography."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/915357814#Person/kim_seungjoo> ; # Seungjoo Kim
    schema:editor <http://experiment.worldcat.org/entity/work/data/915357814#Person/won_dong_ho> ; # Dong Ho Won
    schema:exampleOfWork <http://worldcat.org/entity/work/id/915357814> ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/915357814#CreativeWork/> ;
    schema:name "Information Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers"@en ;
    schema:productID "1006412024" ;
    schema:url <https://doi.org/10.1007/11734727> ;
    schema:url <http://www.library.yorku.ca/eresolver/?id=1243843> ;
    schema:url <http://resolver.scholarsportal.info/isbn/9783540333555> ;
    schema:url <https://login.ezproxy.brunel.ac.uk/login?url=http://dx.doi.org/10.1007/11734727> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3935> ;
    schema:url <http://dx.doi.org/10.1007/11734727> ;
    schema:url <http://www.library.yorku.ca/eresolver/?id=1243842> ;
    schema:url <http://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks0/springer/2010-02-11/1/11734727> ;
    schema:workExample <http://dx.doi.org/10.1007/11734727> ;
    schema:workExample <http://worldcat.org/isbn/9783540333555> ;
    schema:workExample <http://worldcat.org/isbn/9783540333548> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1006412024> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/915357814#Person/kim_seungjoo> # Seungjoo Kim
    a schema:Person ;
    schema:familyName "Kim" ;
    schema:givenName "Seungjoo" ;
    schema:name "Seungjoo Kim" ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Person/won_dong_ho> # Dong Ho Won
    a schema:Person ;
    schema:familyName "Won" ;
    schema:givenName "Dong Ho" ;
    schema:name "Dong Ho Won" ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/computational_complexity> # Computational complexity
    a schema:Intangible ;
    schema:name "Computational complexity"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/computer_software> # Computer software
    a schema:Intangible ;
    schema:name "Computer software"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/cryptographie> # Cryptographie
    a schema:Intangible ;
    schema:name "Cryptographie"@en ;
    schema:name "Cryptographie"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/information_systems> # Information Systems
    a schema:Intangible ;
    schema:name "Information Systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/operating_systems_computers> # Operating systems (Computers)
    a schema:Intangible ;
    schema:name "Operating systems (Computers)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357814#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@en ;
    schema:name "Sécurité informatique"@fr ;
    .

<http://worldcat.org/entity/work/data/915357814#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1006412024> ; # Information Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
    .

<http://worldcat.org/isbn/9783540333548>
    a schema:ProductModel ;
    schema:isbn "3540333541" ;
    schema:isbn "9783540333548" ;
    .

<http://worldcat.org/isbn/9783540333555>
    a schema:ProductModel ;
    schema:isbn "354033355X" ;
    schema:isbn "9783540333555" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1006412024> ; # Information Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture Notes in Computer Science," ;
    .

<http://www.library.yorku.ca/eresolver/?id=1243842>
    rdfs:comment "An electronic book accessible through the World Wide Web; click for information" ;
    .

<http://www.worldcat.org/title/-/oclc/1006412024>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1006412024> ; # Information Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
    schema:dateModified "2019-08-03" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.