did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642128264

Information Security, Practice and Experience : 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings

by ; ; ;
  • ISBN13:

    9783642128264

  • ISBN10:

    3642128262

  • Format: Paperback
  • Copyright: 2010-04-30
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $129.00

Summary

This book constitutes the proceedings of the 6th International Conference on Information Security Practice and Experience, ISPEC 2010, held in Seoul, Korea, in May 2010. The 28 papers presented in this volume were carefully reviewed and selected from 91 submissions. They are grouped in sections on cryptanalysis, algorithms and implementations, network security, access control, identity management, trust management, public key cryptography, and security applications.

Table of Contents

Cryptanalysis
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512p. 1
Integral Attacks on Reduced-Round ARIA Block Cipherp. 19
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distancep. 30
On the Security of NOEKEON against Side Channel Cube Attacksp. 45
Algorithms and Implementations (I)
On Fast and Approximate Attack Tree Computationsp. 56
Width-3 Joint Sparse Formp. 67
Accelerating Inverse of GF(2n) with Precomputationp. 85
Algorithms and Implementations (II)
Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basisp. 96
The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groupsp. 110
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variablesp. 123
Network Security
Host-Based Security Sensor Integrity in Multiprocessing Environmentsp. 138
Using Purpose Capturing Signatures to Defeat Computer Virus Mutatingp. 153
Rate-Based Watermark Traceback: A New Approachp. 172
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholesp. 187
Access Control
Security Analysis and Validation for Access Control in Multi-domain Environment Based on Riskp. 201
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS)p. 217
Identity Management
A Trustworthy ID Management Mechanism in Open Marketp. 229
BioID: Biometric-Based Identity Managementp. 241
Trust Management
Privacy Preserving of Trust Management Credentials Based on Trusted Computingp. 251
Mitigating the Malicious Trust Expansion in Social Network Servicep. 264
Public Key Cryptography
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verificationp. 276
Certificateless KEM and Hybrid Signcryption Schemes Revisitedp. 294
A Deniable Group Key Establishment Protocol in the Standard Modelp. 308
Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Settingp. 324
Security Applications
Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysisp. 341
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzlesp. 359
Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cardsp. 377
Protection Profile for Secure E-Voting Systemsp. 386
Author Indexp. 399
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program