Fr. 135.00

Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings

Anglais · Livre de poche

Expédition généralement dans un délai de 6 à 7 semaines

Description

En savoir plus

This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.
The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.

Table des matières

Analysis Techniques.- A New Approach to ? 2 Cryptanalysis of Block Ciphers.- Analysis and Optimization of Cryptographically Generated Addresses.- Security Analysis of the PACE Key-Agreement Protocol.- Towards Security Notions for White-Box Cryptography.- A Calculus to Detect Guessing Attacks.- Hash Functions.- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n.- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL.- On Free-Start Collisions and Collisions for TIB3.- Database Security and Biometrics.- Detection of Database Intrusion Using a Two-Stage Fuzzy System.- Combining Consistency and Confidentiality Requirements in First-Order Databases.- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping.- Iris Recognition in Nonideal Situations.- Algebraic Attacks and Proxy Re-Encryption.- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.- Practical Algebraic Attacks on the Hitag2 Stream Cipher.- A New Construction of Boolean Functions with Maximum Algebraic Immunity.- Distributed System Security.- A2M: Access-Assured Mobile Desktop Computing.- Automated Spyware Collection and Analysis.- Towards Unifying Vulnerability Information for Attack Graph Construction.- Traitor Tracing without A Priori Bound on the Coalition Size.- SISR - A New Model for Epidemic Spreading of Electronic Threats.- Identity Management and Authentication.- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement.- Robust Authentication Using Physically Unclonable Functions.- Risks of the CardSpace Protocol.- Applied Cryptography.- Fair E-Cash: Be Compact, Spend Faster.- On the Security of Identity Based Ring Signcryption Schemes.- A Storage Efficient Redactable Signature inthe Standard Model.- Generic Construction of Stateful Identity Based Encryption.- Access Control.- Privacy-Aware Attribute-Based Encryption with User Accountability.- Hardware-Assisted Application-Level Access Control.- Towards Trustworthy Delegation in Role-Based Access Control Model.- Secure Interoperation in Multidomain Environments Employing UCON Policies.- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.- MAC and Nonces.- Nonce Generators and the Nonce Reset Problem.- MAC Precomputation with Applications to Secure Memory.- HMAC without the "Second" Key.- P2P and Web Services.- Adding Trust to P2P Distribution of Paid Content.- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale.- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.

A propos de l'auteur

Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.

Résumé

This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.
The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.

Détails du produit

Collaboration Claudio A. Ardagna (Editeur), Claudio Agostino Ardagna (Editeur), Fabio Martinelli (Editeur), Pierangela Samarati (Editeur), Moti Young (Editeur), Moti Yung (Editeur)
Edition Springer, Berlin
 
Langues Anglais
Format d'édition Livre de poche
Sortie 12.08.2009
 
EAN 9783642044731
ISBN 978-3-642-04473-1
Pages 508
Dimensions 155 mm x 27 mm x 238 mm
Poids 785 g
Illustrations XIV, 508 p.
Thèmes Lecture Notes in Computer Science
Security and Cryptology
Lecture Notes in Computer Science / Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Catégories Sciences naturelles, médecine, informatique, technique > Informatique, ordinateurs > Informatique

Computersicherheit, C, Algorithmen und Datenstrukturen, Netzwerksicherheit, Algorithms, Computerprogrammierung und Softwareentwicklung, Kodierungstheorie und Verschlüsselung (Kryptologie), Kryptografie, Verschlüsselungstechnologie, Theoretische Informatik, computer science, Systems and Data Security, Data and Information Security, Mathematical Applications in Computer Science, Mathematics of Computing, Programming Techniques, Computer programming, Algorithms & data structures, Network Security, Computer security, Mathematical & statistical software, Coding theory & cryptology, Mathematical theory of computation, Computer programming / software engineering, Computer science—Mathematics, Maths for computer scientists, Math Applications in Computer Science, Algorithm Analysis and Problem Complexity, Data encryption, Data encryption (Computer science), Cryptology

Commentaires des clients

Aucune analyse n'a été rédigée sur cet article pour le moment. Sois le premier à donner ton avis et aide les autres utilisateurs à prendre leur décision d'achat.

Écris un commentaire

Super ou nul ? Donne ton propre avis.

Pour les messages à CeDe.ch, veuillez utiliser le formulaire de contact.

Il faut impérativement remplir les champs de saisie marqués d'une *.

En soumettant ce formulaire, tu acceptes notre déclaration de protection des données.