Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings

Author:   George I. Davida ,  Yair Frankel
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2001 ed.
Volume:   2200
ISBN:  

9783540426622


Pages:   562
Publication Date:   19 September 2001
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $248.16 Quantity:  
Add to Cart

Share |

Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 4th international Information Security Conference, ISC 2001, held in Malaga, Spain in October 2001. The 37 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections on key distribution, protocols, enhancing technologies, privacy, software protection, message hiding, PKI issues and protocols, hardware/software implementations, cryptanalysis and prevention, implementations, non-repudiation techniques, and contracts and auctions.

Full Product Details

Author:   George I. Davida ,  Yair Frankel
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2001 ed.
Volume:   2200
Dimensions:   Width: 15.50cm , Height: 2.90cm , Length: 23.50cm
Weight:   1.760kg
ISBN:  

9783540426622


ISBN 10:   3540426620
Pages:   562
Publication Date:   19 September 2001
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Key Distribution.- Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures.- Privacy Amplification Theorem for Noisy Main Channel.- Protocols.- Efficient Kerberized Multicast in a Practical Distributed Setting.- Suitability of a Classical Analysis Method for E-commerce Protocols.- Enhancing Technologies.- Hyppocrates A New Proactive Password Checker.- Lenient/Strict Batch Verification in Several Groups.- Privacy.- Absolute Privacy in Voting.- A Logical Model for Privacy Protection.- Software Protection.- DISSECT: DIStribution for SECurity Tool.- An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs.- Message Hiding I.- A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography.- Robust New Method in Frequency Domain Watermarking.- PKI Issues and Protocols.- On the Complexity of Public-Key Certificate Validation.- Liability of Certification Authorities: A Juridical Point of View.- Hardware Implementations.- Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board.- Elliptic Curve Arithmetic Using SIMD.- On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms.- Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator.- Cryptanalysis and Prevention.- A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH.- Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds.- Approximate Power Roots in ?m.- Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.- Implementations.- A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems.- A Secure Publishing Service for Digital Libraries of XML Documents.- Non-repudiation Techniques.- An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party.- Persistent Authenticated Dictionaries and Their Applications.- Contracts and Auctions.- Efficient Optimistic N-Party Contract Signing Protocol.- Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison.- Message Hiding II.- Oblivious Image Watermarking Robust against Scaling and Geometric Distortions.- Fingerprinting Text in Logical Markup Languages.- Payments.- SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery.- Efficient Transferable Cash with Group Signatures.- Security Applications.- An Auditable Metering Scheme for Web Advertisement Applications.- Broker-Based Secure Negotiation of Intellectual Property Rights.- Network and OS Security.- Design of the Decision Support System for Network Security Management to Secure Enterprise Network.- Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis.- Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List