Information Security and Privacy (Record no. 19514)

MARC details
000 -LEADER
fixed length control field 05731nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-3-540-31684-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170628034349.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100926s2005 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540316848
-- 978-3-540-31684-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/b137750
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Boyd, Colin.
Relator term editor.
245 10 - TITLE STATEMENT
Title Information Security and Privacy
Medium [electronic resource] :
Remainder of title 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings /
Statement of responsibility, etc edited by Colin Boyd, Juan Manuel González Nieto.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2005.
300 ## - PHYSICAL DESCRIPTION
Extent XIV, 594 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 3574
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generators -- On the Success Probability of ? 2-attack on RC6 -- Solving Systems of Differential Equations of Addition -- Group Communications -- A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead -- Dynamic Group Key Agreement in Tree-Based Setting -- Immediate Data Authentication for Multicast in Resource Constrained Network -- Elliptic Curve Cryptography -- Redundant Trinomials for Finite Fields of Characteristic 2 -- Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields -- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two -- Mobile Security -- Using “Fair Forfeit” to Prevent Truncation Attacks on Mobile Agents -- An Improved Execution Integrity Solution for Mobile Agents -- RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management -- Side Channel Attacks -- Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards -- Improved Zero Value Attack on XTR -- Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks -- Evaluation and Biometrics -- SIFA: A Tool for Evaluation of High-Grade Security Devices -- Cancelable Key-Based Fingerprint Templates -- Public Key Cryptosystems -- Hybrid Signcryption Schemes with Insider Security -- On the Possibility of Constructing Meaningful Hash Collisions for Public Keys -- Tunable Balancing of RSA -- Access Control I -- Key Management for Role Hierarchy in Distributed Systems -- A Formalization of Distributed Authorization with Delegation -- Signatures I -- Two Improved Partially Blind Signature Schemes from Bilinear Pairings -- On the Security of Nominative Signatures -- Invited Talk -- Who Goes There? Internet Banking: A Matter of Risk and Reward -- Access Control II -- Role Activation Management in Role Based Access Control -- VO-Sec: An Access Control Framework for Dynamic Virtual Organization -- Threshold Cryptography -- An Efficient Implementation of a Threshold RSA Signature Scheme -- GBD Threshold Cryptography with an Application to RSA Key Recovery -- An (n–t)-out-of-n Threshold Ring Signature Scheme -- Protocols I -- Deposit-Case Attack Against Secure Roaming -- Security Requirements for Key Establishment Proof Models: Revisiting Bellare–Rogaway and Jeong–Katz–Lee Protocols -- Group Signatures -- Group Signature Schemes with Membership Revocation for Large Groups -- An Efficient Group Signature Scheme from Bilinear Maps -- Group Signature Where Group Manager, Members and Open Authority Are Identity-Based -- Protocols II -- Analysis of the HIP Base Exchange Protocol -- ID-based Authenticated Key Agreement for Low-Power Mobile Devices -- Signatures II -- On the Security of Two Key-Updating Signature Schemes -- Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS -- Invited Talk -- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security -- Credentials -- Security Analysis and Fix of an Anonymous Credential System -- Counting Abuses Using Flexible Off-line Credentials -- Symmetric Cryptography -- Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity -- New Cryptographic Applications of Boolean Function Equivalence Classes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management of Computing and Information Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name González Nieto, Juan Manuel.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540265474
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 0302-9743 ;
Volume number/sequential designation 3574
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-LNC
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Central Library Central Library 28/06/2017 Springer EBook   E-42693 28/06/2017 28/06/2017 E-Book

Maintained by VTU Library