000 05829nam a22005655i 4500
001 978-0-387-25660-3
003 DE-He213
005 20170628033244.0
007 cr nn 008mamaa
008 100301s2005 xxu| s |||| 0|eng d
020 _a9780387256603
_9978-0-387-25660-3
024 7 _a10.1007/b135818
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aSasaki, Ryoichi.
_eeditor.
245 1 0 _aSecurity and Privacy in the Age of Ubiquitous Computing
_h[electronic resource] :
_bIFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan /
_cedited by Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura.
264 1 _aBoston, MA :
_bSpringer US,
_c2005.
300 _aXVI, 612 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIFIP Advances in Information and Communication Technology,
_x1868-4238 ;
_v181
505 0 _aRegular Papers -- Accountable Anonymous E-Mail -- Protecting Consumer Data in Composite Web Services -- A Decision Matrix Approach -- Assignment of Security Clearances in an Organization -- Tool Supported Management of Information Security Culture -- ERPSEC - A Reference Framework to Enhance Security in ERP Systems -- A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises -- A Secure Quantum Communication Protocol Using Insecure Public Channels -- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems -- Design and Implementation of TPM SUP320 -- Mathematical Models of IP Traceback Methods and Their Verification -- Transferable E-Cash Revisit -- A License Transfer System for Supporting Content Portability in Digital Rights Management -- Secure Human Communications Based on Biometrics Signals -- Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks -- An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN -- The Pairing Problem with User Interaction -- Network Smart Card -- Protection Against Spam Using Pre-Challenges -- Automatically Hardening Web Applications Using Precise Tainting -- Traffic Redirection Attack Protection System (TRAPS) -- Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks -- Design, Implementation, and Evaluation of Fritrace -- Design and Implementation of a High-Performance Network Intrusion Prevention System -- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis -- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection -- Designated-Verifier Proxy Signature Schemes -- Tripartite Concurrent Signatures -- Signcryption in Hierarchical Identity Based Cryptosystem -- Protecting Group Dynamic Information in Large Scale Multicast Groups -- Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks -- Ensuring Media Integrity on Third-Party Infrastructures -- A New Fragile Mesh Watermarking Algorithm for Authentication -- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images -- Workshop Papers -- Overcoming Channel Bandwidth Constraints in Secure SIM Applications -- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation -- On-the-Fly Formal Testing of a Smart Card Applet -- A Computationally Feasible SPA Attack on AES VIA Optimized Search -- The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations -- Streamto: Streaming Content Using a Tamper-Resistant Token.
520 _aInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit springeronline.com. For more information about IFIP, please visit www.ifip.or.at.
650 0 _aComputer science.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aInformation systems.
650 0 _aMultimedia systems.
650 0 _aMathematics.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aInformation Systems and Communication Service.
650 2 4 _aMultimedia Information Systems.
650 2 4 _aApplications of Mathematics.
700 1 _aQing, Sihan.
_eeditor.
700 1 _aOkamoto, Eiji.
_eeditor.
700 1 _aYoshiura, Hiroshi.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387256580
830 0 _aIFIP Advances in Information and Communication Technology,
_x1868-4238 ;
_v181
856 4 0 _uhttp://dx.doi.org/10.1007/b135818
912 _aZDB-2-SCS
999 _c14336
_d14336