The Resource Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings, George I. Davida, Yair Frankel (eds.), (electronic resource)

Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings, George I. Davida, Yair Frankel (eds.), (electronic resource)

Label
Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings
Title
Information security
Title remainder
4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings
Statement of responsibility
George I. Davida, Yair Frankel (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 4th international Information Security Conference, ISC 2001, held in Malaga, Spain in October 2001. The 37 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections on key distribution, protocols, enhancing technologies, privacy, software protection, message hiding, PKI issues and protocols, hardware/software implementations, cryptanalysis and prevention, implementations, non-repudiation techniques, and contracts and auctions
Member of
Cataloging source
COO
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I85 2001
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2001
http://bibfra.me/vocab/lite/meetingName
ISC (Conference : Information security)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Davida, George
  • Frankel, Yair
Series statement
Lecture notes in computer science
Series volume
2200
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Computer security
  • Computers
Label
Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings, George I. Davida, Yair Frankel (eds.), (electronic resource)
Link
http://dx.doi.org/10.1007/3-540-45439-X
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Key Distribution -- Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures -- Privacy Amplification Theorem for Noisy Main Channel -- Protocols -- Efficient Kerberized Multicast in a Practical Distributed Setting -- Suitability of a Classical Analysis Method for E-commerce Protocols -- Enhancing Technologies -- Hyppocrates A New Proactive Password Checker -- Lenient/Strict Batch Verification in Several Groups -- Privacy -- Absolute Privacy in Voting -- A Logical Model for Privacy Protection -- Software Protection -- DISSECT: DIStribution for SECurity Tool -- An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs -- Message Hiding I -- A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography -- Robust New Method in Frequency Domain Watermarking -- PKI Issues and Protocols -- On the Complexity of Public-Key Certificate Validation -- Liability of Certification Authorities: A Juridical Point of View -- Hardware Implementations -- Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board -- Elliptic Curve Arithmetic Using SIMD -- On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms -- Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator -- Cryptanalysis and Prevention -- A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH -- Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds -- Approximate Power Roots in?m -- Securing Elliptic Curve Point Multiplication against Side-Channel Attacks -- Implementations -- A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems -- A Secure Publishing Service for Digital Libraries of XML Documents -- Non-repudiation Techniques -- An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party -- Persistent Authenticated Dictionaries and Their Applications -- Contracts and Auctions -- Efficient Optimistic N-Party Contract Signing Protocol -- Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison -- Message Hiding II -- Oblivious Image Watermarking Robust against Scaling and Geometric Distortions -- Fingerprinting Text in Logical Markup Languages -- Payments -- SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery -- Efficient Transferable Cash with Group Signatures -- Security Applications -- An Auditable Metering Scheme for Web Advertisement Applications -- Broker-Based Secure Negotiation of Intellectual Property Rights -- Network and OS Security -- Design of the Decision Support System for Network Security Management to Secure Enterprise Network -- Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis -- Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD
Dimensions
unknown
Extent
1 online resource (xiii, 554 pages)
Form of item
online
Isbn
9783540454397
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
Specific material designation
remote
System control number
  • (OCoLC)213934180
  • (OCoLC)ocn213934180
Label
Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings, George I. Davida, Yair Frankel (eds.), (electronic resource)
Link
http://dx.doi.org/10.1007/3-540-45439-X
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Key Distribution -- Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures -- Privacy Amplification Theorem for Noisy Main Channel -- Protocols -- Efficient Kerberized Multicast in a Practical Distributed Setting -- Suitability of a Classical Analysis Method for E-commerce Protocols -- Enhancing Technologies -- Hyppocrates A New Proactive Password Checker -- Lenient/Strict Batch Verification in Several Groups -- Privacy -- Absolute Privacy in Voting -- A Logical Model for Privacy Protection -- Software Protection -- DISSECT: DIStribution for SECurity Tool -- An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs -- Message Hiding I -- A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography -- Robust New Method in Frequency Domain Watermarking -- PKI Issues and Protocols -- On the Complexity of Public-Key Certificate Validation -- Liability of Certification Authorities: A Juridical Point of View -- Hardware Implementations -- Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board -- Elliptic Curve Arithmetic Using SIMD -- On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms -- Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator -- Cryptanalysis and Prevention -- A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH -- Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds -- Approximate Power Roots in?m -- Securing Elliptic Curve Point Multiplication against Side-Channel Attacks -- Implementations -- A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems -- A Secure Publishing Service for Digital Libraries of XML Documents -- Non-repudiation Techniques -- An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party -- Persistent Authenticated Dictionaries and Their Applications -- Contracts and Auctions -- Efficient Optimistic N-Party Contract Signing Protocol -- Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison -- Message Hiding II -- Oblivious Image Watermarking Robust against Scaling and Geometric Distortions -- Fingerprinting Text in Logical Markup Languages -- Payments -- SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery -- Efficient Transferable Cash with Group Signatures -- Security Applications -- An Auditable Metering Scheme for Web Advertisement Applications -- Broker-Based Secure Negotiation of Intellectual Property Rights -- Network and OS Security -- Design of the Decision Support System for Network Security Management to Secure Enterprise Network -- Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis -- Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD
Dimensions
unknown
Extent
1 online resource (xiii, 554 pages)
Form of item
online
Isbn
9783540454397
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
Specific material designation
remote
System control number
  • (OCoLC)213934180
  • (OCoLC)ocn213934180

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...