Information Security Applications
Editat de Heung Youl Youm, Moti Yungen Limba Engleză Paperback – 8 ian 2010
Preț: 327.48 lei
Preț vechi: 409.36 lei
-20%
Puncte Express: 491
Preț estimativ în valută:
57.91€ • 66.40$ • 50.05£
57.91€ • 66.40$ • 50.05£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783642108372
ISBN-10: 3642108377
Pagini: 404
Ilustrații: XIII, 386 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2010
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642108377
Pagini: 404
Ilustrații: XIII, 386 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2010
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Multimedia Security.- Protecting IPTV Service Network against Malicious Rendezvous Point.- Design and Implementation of SIP-aware Security Management System.- Device Security.- Application Management Framework in User Centric Smart Card Ownership Model.- When Compromised Readers Meet RFID.- HW Implementation Security.- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?.- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.- Applied Cryptography.- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.- ID-Based Adaptive Oblivious Transfer.- Side Channel Attacks.- Unknown Plaintext Template Attacks.- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices.- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation.- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption.- Cryptograptanalysis.- Finding Collisions for a 45-Step Simplified HAS-V.- Non-linear Error Detection for Finite State Machines.- Quadratic Equations from a Kind of S-boxes.- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.- Anonymity/Authentication/Access Control.- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET.- A Selectable k-Times Relaxed Anonymous Authentication Scheme.- PUF-Based Authentication Protocols – Revisited.- Mediated Ciphertext-Policy Attribute-Based Encryption andIts Application.- Network Security.- Securing Remote Access Inside Wireless Mesh Networks.- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers.- USN Middleware Security Model.- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009.
The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.
The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.