did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540201762

Information Security: 6th International Conference, Isc 2003, Bristol, Uk, October 1-3, 2003 : Proceedings

by ; ;
  • ISBN13:

    9783540201762

  • ISBN10:

    3540201769

  • Format: Paperback
  • Copyright: 2003-10-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $119.00 Save up to $100.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 6th International Conference on Information Security, ISC 2003, held in Bristol, UK in October 2003. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on network security, public key algorithms, cryptographic protocols, protocol attacks, attacks on public key cryptosystems, block ciphers, authorization, water marking, software security, and codes and related issues.

Table of Contents

Revisiting Software Protectionp. 1
Enabling Shared Audit Datap. 14
Cryptographically Generated Addresses (CGA)p. 29
Validating and Securing Spontaneous Associations between Wireless Devicesp. 44
Single Sign-On Using Trusted Platformsp. 54
Easy Verifiable Primitives and Practical Public Key Cryptosystemsp. 69
Reactively Secure Signature Schemesp. 84
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocationp. 96
A Fast Signature Scheme Based on New On-line Computationp. 111
Distributed RSA Signature Schemes for General Access Structuresp. 122
Divisible Voting Schemep. 137
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computationsp. 151
The Design and Implementation of Protocol-Based Hidden Key Recoveryp. 165
Intrinsic Limitations of Digital Signatures and How to Cope with Themp. 180
On the Security of Fair Non-repudiation Protocolsp. 193
Security Analysis of a Password Authenticated Key Exchange Protocolp. 208
Zero-Value Point Attacks on Elliptic Curve Cryptosystemp. 218
Cryptanalysis of an Algebraic Privacy Homomorphismp. 234
Analysis of the Insecurity of ECMQV with Partially Known Noncesp. 240
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DESp. 252
A Note on Weak Keys of PES, IDEA, and Some Extended Variantsp. 267
Foundations of Differential Cryptanalysis in Abelian Groupsp. 280
Trust and Authorization in Pervasive B2E Scenariosp. 295
A Logic Model for Temporal Authorization Delegation with Negationp. 310
Zero-Distortion Authentication Watermarkingp. 325
Designated Verification of Non-invertible Watermarkp. 338
Proactive Software Tampering Detectionp. 352
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploitsp. 366
Towards a Business Process-Driven Framework for Security Engineering with the UMLp. 381
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemesp. 396
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relationsp. 408
Short c-Secure Fingerprinting Codesp. 422
The Role of Arbiters in Asymmetric Authentication Schemesp. 428
Author Indexp. 443
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program