Security and Privacy in the Age of Ubiquitous Computing (Record no. 14336)

MARC details
000 -LEADER
fixed length control field 05829nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-0-387-25660-3
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170628033244.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2005 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780387256603
-- 978-0-387-25660-3
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/b135818
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sasaki, Ryoichi.
Relator term editor.
245 10 - TITLE STATEMENT
Title Security and Privacy in the Age of Ubiquitous Computing
Medium [electronic resource] :
Remainder of title IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan /
Statement of responsibility, etc edited by Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura.
264 #1 -
-- Boston, MA :
-- Springer US,
-- 2005.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 612 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement IFIP Advances in Information and Communication Technology,
International Standard Serial Number 1868-4238 ;
Volume number/sequential designation 181
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Regular Papers -- Accountable Anonymous E-Mail -- Protecting Consumer Data in Composite Web Services -- A Decision Matrix Approach -- Assignment of Security Clearances in an Organization -- Tool Supported Management of Information Security Culture -- ERPSEC - A Reference Framework to Enhance Security in ERP Systems -- A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises -- A Secure Quantum Communication Protocol Using Insecure Public Channels -- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems -- Design and Implementation of TPM SUP320 -- Mathematical Models of IP Traceback Methods and Their Verification -- Transferable E-Cash Revisit -- A License Transfer System for Supporting Content Portability in Digital Rights Management -- Secure Human Communications Based on Biometrics Signals -- Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks -- An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN -- The Pairing Problem with User Interaction -- Network Smart Card -- Protection Against Spam Using Pre-Challenges -- Automatically Hardening Web Applications Using Precise Tainting -- Traffic Redirection Attack Protection System (TRAPS) -- Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks -- Design, Implementation, and Evaluation of Fritrace -- Design and Implementation of a High-Performance Network Intrusion Prevention System -- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis -- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection -- Designated-Verifier Proxy Signature Schemes -- Tripartite Concurrent Signatures -- Signcryption in Hierarchical Identity Based Cryptosystem -- Protecting Group Dynamic Information in Large Scale Multicast Groups -- Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks -- Ensuring Media Integrity on Third-Party Infrastructures -- A New Fragile Mesh Watermarking Algorithm for Authentication -- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images -- Workshop Papers -- Overcoming Channel Bandwidth Constraints in Secure SIM Applications -- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation -- On-the-Fly Formal Testing of a Smart Card Applet -- A Computationally Feasible SPA Attack on AES VIA Optimized Search -- The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations -- Streamto: Streaming Content Using a Tamper-Resistant Token.
520 ## - SUMMARY, ETC.
Summary, etc International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit springeronline.com. For more information about IFIP, please visit www.ifip.or.at.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Multimedia systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mathematics.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Structures, Cryptology and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Systems and Communication Service.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Multimedia Information Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Applications of Mathematics.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Qing, Sihan.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Okamoto, Eiji.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yoshiura, Hiroshi.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9780387256580
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IFIP Advances in Information and Communication Technology,
-- 1868-4238 ;
Volume number/sequential designation 181
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a>
912 ## -
-- ZDB-2-SCS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Central Library Central Library 28/06/2017 Springer EBook   E-37515 28/06/2017 28/06/2017 E-Book

Maintained by VTU Library