Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Erscheinungszeitraum
Fachgebiete(RVK)
Zugriff
  • 1
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg
    UID:
    gbv_1649266022
    Umfang: Online-Ressource
    ISBN: 9783540458616 , 3540433198
    Serie: Lecture Notes in Computer Science 2288
    Inhalt: Practical Security in Public-Key Cryptography -- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances -- Truncated Differential Cryptanalysis of Camellia -- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton -- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding -- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption -- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm -- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring -- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation -- Decentralized Event Correlation for Intrusion Detection -- Enhancing the Security of Cookies -- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation -- Efficient Revocation Schemes for Secure Multicast -- Binary Codes for Collusion-Secure Fingerprinting -- Copyright Protection of Object-Oriented Software -- Off-Line Authentication Using Watermarks -- Slide Attacks with a Known-Plaintext Cryptanalysis -- Constructions of Cheating Immune Secret Sharing -- Private Computation with Shared Randomness over Broadcast Channel -- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements -- Practical Reasoning about Accountability in Electronic Commerce Protocols -- Content Extraction Signatures -- New Signcryption Schemes Based on KCDSA -- An Efficient and Provably Secure Threshold Blind Signature -- A Multi-signature Scheme with Signers’ Intentions Secure against Active Attacks -- A Distributed Light-Weight Authentication Model for Ad-hoc Networks -- Design of an Authentication Protocol for Gsm Javacards -- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment -- Protecting General Flexible Itineraries of Mobile Agents -- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis -- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack -- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks -- DPA Countermeasure Based on the “Masking Method”.
    Inhalt: Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6–7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into the sky on the island of Youido, the Manhattan of Korea, and ranks by far the tallest of all buildings in the country. The program committee received 102 submissions from 17 countries and regions (Australia, Belgium, China, Denmark, France, Germany, India, Italy, Japan, Korea, The Netherlands, Spain, Taiwan, Thailand, Vietnam, UK, and USA), of which 32 were selected for presentation in 8 sessions. All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on “Practical Security in Public-Key Cryptography”. We are very grateful to all the program committee members who devoted much e?ort and valuable time to reading and selecting the papers. These p- ceedingscontainthe?nalversionofeachpaperrevisedaftertheconference.Since the revised versions were not checked by the program committee rigorously, the authors must bear full responsibility for the contents of their papers.
    Anmerkung: Lizenzpflichtig
    Weitere Ausg.: ISBN 9783540433194
    Weitere Ausg.: Buchausg. u.d.T. Information security and cryptology Berlin : Springer, 2002 ISBN 3540433198
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    gbv_342497588
    Umfang: XIII, 456 S. , Ill., graph. Darst. , 24 cm
    ISBN: 3540433198
    Serie: Lecture notes in computer science 2288
    Anmerkung: Literaturangaben
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Kim, Kwangjo Information Security and Cryptology — ICISC 2001 Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2002 ISBN 9783540458616
    Weitere Ausg.: ISBN 3540433198
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Konferenzschrift
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Buch
    Buch
    Berlin [u.a.] : Springer-Verlag
    UID:
    kobvindex_ZLB13392416
    Umfang: XIII, 456 Seiten , graph. Darst. , 24 cm
    ISBN: 3540433198
    Serie: Lecture notes in computer science 2288
    Anmerkung: Literaturangaben , Text engl.
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Kongress ; Kryptosystem ; Seoul 〈2001〉 ; Kryptosystem ; Kongress ; Seoul 〈2001〉 ; Public-Key-Kryptosystem ; Kongress ; Kryptosystem ; Seoul 〈2001〉 ; Kryptologie ; Kongress ; Seoul 〈2001〉 ; Public-Key-Kryptosystem ; Kongress ; Seoul 〈2001〉 ; Kongress ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    b3kat_BV014160354
    Umfang: XIII, 456 S. , Ill., graph. Darst.
    ISBN: 3540433198
    Serie: Lecture notes in computer science 2288
    Anmerkung: Literaturangaben
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Buch
    Buch
    Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London :Springer,
    UID:
    almafu_BV014160354
    Umfang: XIII, 456 S. : Ill., graph. Darst.
    ISBN: 3-540-43319-8
    Serie: Lecture notes in computer science 2288
    Anmerkung: Literaturangaben
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    almahu_9947920455702882
    Umfang: XIII, 460 p. , online resource.
    ISBN: 9783540458616
    Serie: Lecture Notes in Computer Science, 2288
    Inhalt: Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6–7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into the sky on the island of Youido, the Manhattan of Korea, and ranks by far the tallest of all buildings in the country. The program committee received 102 submissions from 17 countries and regions (Australia, Belgium, China, Denmark, France, Germany, India, Italy, Japan, Korea, The Netherlands, Spain, Taiwan, Thailand, Vietnam, UK, and USA), of which 32 were selected for presentation in 8 sessions. All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on “Practical Security in Public-Key Cryptography”. We are very grateful to all the program committee members who devoted much e?ort and valuable time to reading and selecting the papers. These p- ceedingscontainthe?nalversionofeachpaperrevisedaftertheconference.Since the revised versions were not checked by the program committee rigorously, the authors must bear full responsibility for the contents of their papers.
    Anmerkung: Practical Security in Public-Key Cryptography -- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances -- Truncated Differential Cryptanalysis of Camellia -- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton -- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding -- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption -- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm -- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring -- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation -- Decentralized Event Correlation for Intrusion Detection -- Enhancing the Security of Cookies -- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation -- Efficient Revocation Schemes for Secure Multicast -- Binary Codes for Collusion-Secure Fingerprinting -- Copyright Protection of Object-Oriented Software -- Off-Line Authentication Using Watermarks -- Slide Attacks with a Known-Plaintext Cryptanalysis -- Constructions of Cheating Immune Secret Sharing -- Private Computation with Shared Randomness over Broadcast Channel -- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements -- Practical Reasoning about Accountability in Electronic Commerce Protocols -- Content Extraction Signatures -- New Signcryption Schemes Based on KCDSA -- An Efficient and Provably Secure Threshold Blind Signature -- A Multi-signature Scheme with Signers’ Intentions Secure against Active Attacks -- A Distributed Light-Weight Authentication Model for Ad-hoc Networks -- Design of an Authentication Protocol for Gsm Javacards -- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment -- Protecting General Flexible Itineraries of Mobile Agents -- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis -- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack -- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks -- DPA Countermeasure Based on the “Masking Method”.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540433194
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    almahu_9948621605302882
    Umfang: XIII, 460 p. , online resource.
    Ausgabe: 1st ed. 2002.
    ISBN: 9783540458616
    Serie: Lecture Notes in Computer Science, 2288
    Inhalt: Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6-7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into the sky on the island of Youido, the Manhattan of Korea, and ranks by far the tallest of all buildings in the country. The program committee received 102 submissions from 17 countries and regions (Australia, Belgium, China, Denmark, France, Germany, India, Italy, Japan, Korea, The Netherlands, Spain, Taiwan, Thailand, Vietnam, UK, and USA), of which 32 were selected for presentation in 8 sessions. All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on "Practical Security in Public-Key Cryptography". We are very grateful to all the program committee members who devoted much e?ort and valuable time to reading and selecting the papers. These p- ceedingscontainthe?nalversionofeachpaperrevisedaftertheconference.Since the revised versions were not checked by the program committee rigorously, the authors must bear full responsibility for the contents of their papers.
    Anmerkung: Practical Security in Public-Key Cryptography -- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances -- Truncated Differential Cryptanalysis of Camellia -- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton -- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding -- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption -- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm -- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring -- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation -- Decentralized Event Correlation for Intrusion Detection -- Enhancing the Security of Cookies -- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation -- Efficient Revocation Schemes for Secure Multicast -- Binary Codes for Collusion-Secure Fingerprinting -- Copyright Protection of Object-Oriented Software -- Off-Line Authentication Using Watermarks -- Slide Attacks with a Known-Plaintext Cryptanalysis -- Constructions of Cheating Immune Secret Sharing -- Private Computation with Shared Randomness over Broadcast Channel -- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements -- Practical Reasoning about Accountability in Electronic Commerce Protocols -- Content Extraction Signatures -- New Signcryption Schemes Based on KCDSA -- An Efficient and Provably Secure Threshold Blind Signature -- A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks -- A Distributed Light-Weight Authentication Model for Ad-hoc Networks -- Design of an Authentication Protocol for Gsm Javacards -- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment -- Protecting General Flexible Itineraries of Mobile Agents -- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis -- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack -- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks -- DPA Countermeasure Based on the "Masking Method".
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783662168929
    Weitere Ausg.: Printed edition: ISBN 9783540433194
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 3540133178?
Meinten Sie 3540403108?
Meinten Sie 3540333118?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz