000 04293nam a22003975i 4500
001 299112
003 MX-SnUAN
005 20160429155534.0
007 cr nn 008mamaa
008 150903s2008 gw | o |||| 0|eng d
020 _a9783540791041
_99783540791041
024 7 _a10.1007/9783540791041
_2doi
035 _avtls000351801
039 9 _a201509030930
_bVLOAD
_c201405060256
_dVLOAD
_y201402171145
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.A25
100 1 _aChen, Liqun.
_eeditor.
_9335408
245 1 0 _aInformation Security Practice and Experience :
_b4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
_cedited by Liqun Chen, Yi Mu, Willy Susilo.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2008.
300 _brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4991
500 _aSpringer eBooks
505 0 _aVerification of Integrity and Secrecy Properties of a Biometric Authentication Protocol -- An On-Line Secure E-Passport Protocol -- Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly -- 1-out-of-n Oblivious Signatures -- A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes -- Private Query on Encrypted Data in Multi-user Settings -- Towards Tamper Resistant Code Encryption: Practice and Experience -- A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh’s HIBE Scheme -- RSA Moduli with a Predetermined Portion: Techniques and Applications -- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs -- Secure Cryptographic Precomputation with Insecure Memory -- Securing Peer-to-Peer Distributions for Mobile Devices -- Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks -- Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers -- PROBE: A Process Behavior-Based Host Intrusion Prevention System -- Towards the World-Wide Quantum Network -- Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software -- Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains -- Privacy of Recent RFID Authentication Protocols -- A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection -- An Efficient Countermeasure against Side Channel Attacks for Pairing Computation -- Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic -- Secure Computation of the Vector Dominance Problem -- Rational Secret Sharing with Repeated Games -- Distributed Private Matching and Set Operations -- Computational Soundness of Non-Malleable Commitments -- Square Attack on Reduced-Round Zodiac Cipher -- Analysis of Zipper as a Hash Function -- On the Importance of the Key Separation Principle for Different Modes of Operation.
520 _aThis book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The 29 revised full papers were carefully reviewed and selected from 95 submissions. The papers cover a wide range of topics in mathematics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve based security practice, security computation and so forth.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aMu, Yi.
_eeditor.
_9328484
700 1 _aSusilo, Willy.
_eeditor.
_9333850
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783540791034
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-540-79104-1
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c299112
_d299112