Catalogue


Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings /
George I. Davida, Yair Frankel (eds.)
imprint
Berlin ; New York : Springer, c2001.
description
xiii, 554 p. : ill.
ISBN
3540426620 (pbk. : alk. paper)
format(s)
Book
Holdings
More Details
imprint
Berlin ; New York : Springer, c2001.
isbn
3540426620 (pbk. : alk. paper)
catalogue key
4610543
 
Includes bibliographical references and index.
A Look Inside
Summaries
Main Description
This book constitutes the refereed proceedings of the 4th international Information Security Conference, ISC 2001, held in Malaga, Spain in October 2001.The 37 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections on key distribution, protocols, enhancing technologies, privacy, software protection, message hiding, PKI issues and protocols, hardware/software implementations, cryptanalysis and prevention, implementations, non-repudiation techniques, and contracts and auctions.
Main Description
This book constitutes the refereed proceedings of the 4th international Information Security Conference, ISC 2001, held in Malaga, Spain in October 2001. The 37 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections on key distribution, protocols, enhancing technologies, privacy, software protection, message hiding, PKI issues and protocols, hardware/software implementations, cryptanalysis and prevention, implementations, non-repudiation techniques, and contracts and auctions.
Table of Contents
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structuresp. 1
Privacy Amplification Theorem for Noisy Main Channelp. 18
Efficient Kerberized Multicast in a Practical Distributed Settingp. 27
Suitability of a Classical Analysis Method for E-commerce Protocolsp. 46
Hyppocrates (A New Proactive Password Checker)p. 63
Lenient/Strict Batch Verification in Several Groupsp. 81
Absolute Privacy in Votingp. 95
A Logical Model for Privacy Protectionp. 110
DISSECT: DIStribution for SECurity Toolp. 125
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programsp. 144
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganographyp. 156
Robust New Method in Frequency Domain Watermarkingp. 166
On the Complexity of Public-Key Certificate Validationp. 183
Liability of Certification Authorities: A Juridical Point of Viewp. 204
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Boardp. 220
Elliptic Curve Arithmetic Using SIMDp. 235
On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithmsp. 248
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Acceleratorp. 266
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASHp. 280
Quadratic Relations for S-Boxes: Their Minimum Representations and Boundsp. 294
Approximate Power Roots in Z[subscript m]p. 310
Securing Elliptic Curve Point Multiplication against Side-Channel Attacksp. 324
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systemsp. 335
A Secure Publishing Service for Digital Libraries of XML Documentsp. 347
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Partyp. 363
Persistent Authenticated Dictionaries and Their Applicationsp. 379
Efficient Optimistic N-Party Contract Signing Protocolp. 394
Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparisonp. 408
Oblivious Image Watermarking Robust against Scaling and Geometric Distortionsp. 420
Fingerprinting Text in Logical Markup Languagesp. 433
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Deliveryp. 446
Efficient Transferable Cash with Group Signaturesp. 462
An Auditable Metering Scheme for Web Advertisement Applicationsp. 475
Broker-Based Secure Negotiation of Intellectual Property Rightsp. 486
Design of the Decision Support System for Network Security Management to Secure Enterprise Networkp. 497
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysisp. 512
Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSDp. 536
Author Indexp. 553
Table of Contents provided by Blackwell. All Rights Reserved.

This information is provided by a service that aggregates data from review sources and other sources that are often consulted by libraries, and readers. The University does not edit this information and merely includes it as a convenience for users. It does not warrant that reviews are accurate. As with any review users should approach reviews critically and where deemed necessary should consult multiple review sources. Any concerns or questions about particular reviews should be directed to the reviewer and/or publisher.

  link to old catalogue

Report a problem