did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642278891

Information Security Applications

by ;
  • ISBN13:

    9783642278891

  • ISBN10:

    3642278892

  • Format: Paperback
  • Copyright: 2012-03-11
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $69.99 Save up to $46.36
  • Digital
    $51.19
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.

Table of Contents

Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313p. 1
Generalized Security Analysis of the Random Key Bits Leakage Attackp. 13
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipherp. 28
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forwardp. 40
Known-Key Distinguisher on Round-Reduced 3D Block Cipherp. 55
Identity-Based Signcryption from Identity-Based Cryptographyp. 70
Order-Preserving Encryption for Non-uniformly Distributed Plaintextsp. 84
Solving a DLP with Auxiliary Input with the ¿-Algorithmp. 98
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystemsp. 109
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakagep. 121
Rule Indexing for Efficient Intrusion Detection Systemsp. 136
Security Data Extraction from LEC 61850 ACSI Models for Network and System Managementp. 142
Lightweight Middleware-Based ZigBee Security in Building Energy Management Systemp. 151
A Map-Layer-Based Access Control Modelp. 157
Application Authentication for Hybrid Services of Broadcasting and Communications Networksp. 171
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocolsp. 187
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networksp. 203
Mutual Private Set Intersection with Linear Complexityp. 219
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNsp. 232
Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportationp. 242
Exploiting Routing Tree Construction in CTPp. 256
Author Indexp. 271
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program