Information security [electronic resource] : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / Sokratis K. Katsikas [and others] (eds.)

Saved in:
Bibliographic Details
Corporate Author: ISC (Conference : Information security) Samos, Greece)
Other Authors: Katsikas, Sokratis K.
Other title:ISC 2006.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2006.
Series:Lecture notes in computer science ; 4176.
Subjects:

MARC

LEADER 00000cam a2200000ua 4500
001 b4145153
003 CoU
006 m o d
007 cr |||||||||||
008 060720s2006 gw a ob 101 0 eng d
005 20231212002921.4
010 |a 2006931359 
019 |a 456728799  |a 880010377 
020 |a 9783540383413 
020 |a 3540383417 
020 |a 3540383433 
020 |a 9783540383437 
035 |a (OCoLC)ocm71200478 
035 |a (OCoLC)71200478  |z (OCoLC)456728799  |z (OCoLC)880010377 
040 |a OHX  |b eng  |c OHX  |d DLC  |d BAKER  |d CUS  |d YDXCP  |d IQU  |d C$Q  |d IXA  |d BTCTA  |d LVB  |d UMC  |d GW5XE  |d E7B  |d IAD  |d OCLCF  |d QE2  |d OL$  |d NJI  |d OCLCO  |d OCLCQ  |d SLY  |d I8M  |d OCL  |d OCLCO 
042 |a lccopycat 
049 |a GWRE 
050 0 0 |a QA76.9.A25  |b I85 2006 
055 3 |a QA75  |b .L38 no.4176 
111 2 |a ISC (Conference : Information security)  |n (9th :  |d 2006 :  |c Samos, Greece)  |0 http://id.loc.gov/authorities/names/nb2006020916. 
245 1 0 |a Information security  |h [electronic resource] :  |b 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings /  |c Sokratis K. Katsikas [and others] (eds.) 
246 3 0 |a ISC 2006. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2006. 
300 |a xiv, 548 pages :  |b illustrations ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent. 
337 |a unmediated  |b n  |2 rdamedia. 
338 |a volume  |b nc  |2 rdacarrier. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 4176. 
504 |a Includes bibliographical references and index. 
505 1 |a Software security -- Extending .NET security to unmanaged code / Patrick Klinkoff [and others] -- Transparent run-time prevention of format-string attacks via dynamic taint and flexible validation / Zhiqiang Lin [and others] -- Privacy and anonymity -- Low latency anonymity with mix rings / Matthew Burnside, Angeles D. Keromytis -- Breaking four mix-related schemes based on universal re-encryption / George Danezis -- Weak k-anonymity : a low-distortion model for protecting privacy / Maurizio Atzori -- Protecting data privacy through hard-to-reverse negative databases / Fernando Esponda [and others] -- Block ciphers and hash functions -- Related-key rectangle attack on 42-round SHACAL-2 / Jiqiang Lu [and others] -- On the collision resistance of RIPEMD-160 / Florian Mendel [and others] -- Digital signatures -- Blind ring signatures secure under the chosen-target-CDH assumption / Javier Herranz, Fabien Laguillaumie -- Multi-party concurrent signatures / Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini -- Formal security model of multisignatures / Yuichi Komano [and others] -- Cryptanalysis of variants of UOV / Yuh-Hua Hu [and others] -- Stream ciphers -- TRIVIUM : a stream cipher construction inspired by block cipher design principles / Christophe De Cannière -- Cryptanalysis of the Bluetooth E₀ cipher using OBDD's / Yaniv Shaked, Avishai Wool -- Encryption I -- A partial key exposure attack on RSA using a 2-dimensional lattice / Ellen Jochemsz, Benne de Weger -- On the integration of public key data encryption and public key encryption with keyword search / Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo -- Collusion free policy-based encryption / Walid Bagga, Refik Molva. 
505 1 |a Pervasive computing -- Using multiple smart cards for signing messages at malicious terminals / István Zsolt Berta -- Diverging keys in wireless sensor networks / Michal Ren, Tanmoy Kanti Das, Jianying Zhou -- Encryption II -- A generic transformation from symmetric to asymmetric broadcast encryption / Ulrich Huber, Ahmad-Reza Sadeghi -- Transparent image encryption using progressive JPEG / Thomas Stütz, Andreas Uhl -- Network security -- Preserving TCP connections across host address changes / Vassilis Prevelakis, Sotiris Ioannidis -- A security architecture for protecting LAN interactions / André Zúquete, Hugo Marques -- Simulation of Internet DDoS attacks and defense / Igor Kotenko, Alexander Ulanov -- SNOOZE : toward a Stateful NetwOrk prOtocol fuzZEr / Greg Banks [and others] -- Watermarking and DRM -- Rights protection for data cubes / Jie Guo [and others] -- An efficient probabilistic packet marking scheme (NOD-PPM) / Huifang Yin, Jun Li -- Intrusion detection and worms -- Resistance analysis to intruders' evasion of detecting intrusion / Jianhua Yang [and others] -- A wireless intrusion detection system for secure clustering and routing in ad hoc networks / Luciano Bononi, Carlo Tacconi -- Anomaly intrusion detection based on clustering a data stream / Sang-Hyun Oh [and others] -- Robust reactions to potential day-zero worms through cooperation and validation / K. Anagnostakis [and others] -- Key exchange -- An authentication and key exchange protocol for secure credential services / SeongHan Shin, Kazukuni Kobara, Hideki Imai -- A non-malleable group key exchange protocol robust against active insiders / Yvo Desmedt [and others] -- Security protocols and formal methods -- Formalising receipt-freeness / H.L. Jonker, E.P. de Vink -- Enhancing the security and efficiency of 3-D secure / Mohammed Assora, Ayoub Shirvani -- Designing and verifying core protocols for location privacy / David von Oheimb, Jorge Cuellar -- Information systems security -- Delegation in a distributed healthcare context : a survey of current approaches / Mila Katzarova, Andrew Simpson -- Managing information systems security : critical success factors and indicators to measure effectiveness / Jose M. Torres [and others] 
583 1 |a committed to retain  |c 20230101  |d 20480101  |5 CoU  |f Alliance Shared Trust  |u https://www.coalliance.org/shared-print-archiving-policies. 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458. 
650 0 |a Computers  |x Access control  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008440. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Katsikas, Sokratis K.  |0 http://id.loc.gov/authorities/names/nr97001917  |1 http://isni.org/isni/0000000054557630. 
830 0 |a Lecture notes in computer science ;  |v 4176.  |0 http://id.loc.gov/authorities/names/n42015162. 
907 |a .b41451533  |b 03-19-20  |c 02-09-07 
998 |a pas  |b 02-14-07  |c -  |d m   |e -  |f eng  |g gw   |h 0  |i 2 
907 |a .b41451533  |b 07-08-19  |c 02-09-07 
944 |a MARS - RDA ENRICHED 
907 |a .b41451533  |b 06-04-19  |c 02-09-07 
907 |a .b41451533  |b 07-05-17  |c 02-09-07 
948 |a bslw18/19 : jun : ess 
999 f f |i 4dc958a9-3f78-5f98-9055-b5aa313a3778  |s 303f91f5-4f53-5d19-9f25-07b94b4d0f73 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Boulder Campus  |c Offsite  |d PASCAL Offsite  |e QA76.9.A25 I85 2006  |h Library of Congress classification  |i book  |m P203350107010  |n 1