Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings

Author:   Kwangjo Kim
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2002 ed.
Volume:   2288
ISBN:  

9783540433194


Pages:   460
Publication Date:   06 March 2002
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.07 Quantity:  
Add to Cart

Share |

Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 4th International Conference on Security and Cryptology, ICISC 2001, held in Seoul, Korea, in December 2001.The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 107 submissions. All current issues of cryptography and cryptanalysis and their applications to securing data, systems, and communications are addressed.

Full Product Details

Author:   Kwangjo Kim
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2002 ed.
Volume:   2288
Dimensions:   Width: 15.50cm , Height: 2.40cm , Length: 23.50cm
Weight:   1.460kg
ISBN:  

9783540433194


ISBN 10:   3540433198
Pages:   460
Publication Date:   06 March 2002
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Practical Security in Public-Key Cryptography.- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.- Truncated Differential Cryptanalysis of Camellia.- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding.- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm.- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.- Decentralized Event Correlation for Intrusion Detection.- Enhancing the Security of Cookies.- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation.- Efficient Revocation Schemes for Secure Multicast.- Binary Codes for Collusion-Secure Fingerprinting.- Copyright Protection of Object-Oriented Software.- Off-Line Authentication Using Watermarks.- Slide Attacks with a Known-Plaintext Cryptanalysis.- Constructions of Cheating Immune Secret Sharing.- Private Computation with Shared Randomness over Broadcast Channel.- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements.- Practical Reasoning about Accountability in Electronic Commerce Protocols.- Content Extraction Signatures.- New Signcryption Schemes Based on KCDSA.- An Efficient and Provably Secure Threshold Blind Signature.- A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks.- A Distributed Light-Weight Authentication Model for Ad-hoc Networks.- Design of an Authentication Protocol for Gsm Javacards.- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.- Protecting General Flexible Itineraries of Mobile Agents.- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.- DPA Countermeasure Based on the Masking Method .

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List