このページのリンク

Information Security and Cryptology - ICISC 2004 : 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers / edited by Choonsik Park, Seongtaek Chee
(Security and Cryptology. ISSN:29461863 ; 3506)

データ種別 電子ブック
1st ed. 2005.
出版者 (Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer)
出版年 2005
大きさ XIV, 490 p : online resource
著者標目 Park, Choonsik editor
Chee, Seongtaek editor
SpringerLink (Online service)

所蔵情報を非表示

URL
射水-電子 007 EB0004215 Computer Scinece R0 2005-6,2022-3

9783540320838

書誌詳細を非表示

一般注記 Invited Talks -- Security by, and for, Converged Mobile Devices -- Security for Ubiquitous Computing -- Block Cipher and Stream Cipher -- Algebraic Attacks on Combiners with Memory and Several Outputs -- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA -- Dragon: A Fast Word Based Stream Cipher -- Public Key Cryptosystem -- An Efficient and Verifiable Solution to the Millionaire Problem -- All in the XL Family: Theory and Practice -- Efficient Broadcast Encryption Using Multiple Interpolation Methods -- On Private Scalar Product Computation for Privacy-Preserving Data Mining -- PKI and Related Implementation -- Separable Implicit Certificate Revocation -- Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation -- Improvement on Ha-Moon Randomized Exponentiation Algorithm -- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields -- Digital Signature -- On Subliminal Channels in Deterministic Signature Schemes -- Threshold Entrusted Undeniable Signature -- On the Security Models of (Threshold) Ring Signature Schemes -- Identity Based Threshold Ring Signature -- Batch Verifications with ID-Based Signatures -- Elliptic Curve Cryptosystem -- A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method -- Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations -- New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method -- Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors -- Provable Security and Primitives -- On the Pseudorandomness of a Modification of KASUMI Type Permutations -- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model -- Padding Oracle Attacks on Multiple Modes of Operation -- An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes -- Network Security -- Identity-Based Access Control for Ad Hoc Groups -- Mobile Mixing -- A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems -- ADWICE – Anomaly Detection with Real-Time Incremental Clustering -- Steganography -- Steganography for Executables and Code Transformation Signatures -- On Security Notions for Steganalysis -- A Block Oriented Fingerprinting Scheme in Relational Database -- Biometrics -- A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis -- Profile-Based 3D Face Registration and Recognition
HTTP:URL=https://doi.org/10.1007/b137120
件 名 LCSH:Cryptography
LCSH:Data encryption (Computer science)
LCSH:Computer science -- Mathematics  全ての件名で検索
LCSH:Discrete mathematics
LCSH:Operating systems (Computers)
LCSH:Electronic data processing -- Management  全ての件名で検索
LCSH:Algorithms
LCSH:Computer networks 
FREE:Cryptology
FREE:Discrete Mathematics in Computer Science
FREE:Operating Systems
FREE:IT Operations
FREE:Algorithms
FREE:Computer Communication Networks
分 類 LCC:QA268
DC23:005.824
書誌ID EB00003603
ISBN 9783540320838

 類似資料