|
|
|
|
LEADER |
00000cam a2200000ua 4500 |
001 |
b4145153 |
003 |
CoU |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
060720s2006 gw a ob 101 0 eng d |
005 |
20231212002921.4 |
010 |
|
|
|a 2006931359
|
019 |
|
|
|a 456728799
|a 880010377
|
020 |
|
|
|a 9783540383413
|
020 |
|
|
|a 3540383417
|
020 |
|
|
|a 3540383433
|
020 |
|
|
|a 9783540383437
|
035 |
|
|
|a (OCoLC)ocm71200478
|
035 |
|
|
|a (OCoLC)71200478
|z (OCoLC)456728799
|z (OCoLC)880010377
|
040 |
|
|
|a OHX
|b eng
|c OHX
|d DLC
|d BAKER
|d CUS
|d YDXCP
|d IQU
|d C$Q
|d IXA
|d BTCTA
|d LVB
|d UMC
|d GW5XE
|d E7B
|d IAD
|d OCLCF
|d QE2
|d OL$
|d NJI
|d OCLCO
|d OCLCQ
|d SLY
|d I8M
|d OCL
|d OCLCO
|
042 |
|
|
|a lccopycat
|
049 |
|
|
|a GWRE
|
050 |
0 |
0 |
|a QA76.9.A25
|b I85 2006
|
055 |
|
3 |
|a QA75
|b .L38 no.4176
|
111 |
2 |
|
|a ISC (Conference : Information security)
|n (9th :
|d 2006 :
|c Samos, Greece)
|0 http://id.loc.gov/authorities/names/nb2006020916.
|
245 |
1 |
0 |
|a Information security
|h [electronic resource] :
|b 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings /
|c Sokratis K. Katsikas [and others] (eds.)
|
246 |
3 |
0 |
|a ISC 2006.
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c ©2006.
|
300 |
|
|
|a xiv, 548 pages :
|b illustrations ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia.
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier.
|
490 |
1 |
|
|a Lecture notes in computer science,
|x 0302-9743 ;
|v 4176.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
1 |
|
|a Software security -- Extending .NET security to unmanaged code / Patrick Klinkoff [and others] -- Transparent run-time prevention of format-string attacks via dynamic taint and flexible validation / Zhiqiang Lin [and others] -- Privacy and anonymity -- Low latency anonymity with mix rings / Matthew Burnside, Angeles D. Keromytis -- Breaking four mix-related schemes based on universal re-encryption / George Danezis -- Weak k-anonymity : a low-distortion model for protecting privacy / Maurizio Atzori -- Protecting data privacy through hard-to-reverse negative databases / Fernando Esponda [and others] -- Block ciphers and hash functions -- Related-key rectangle attack on 42-round SHACAL-2 / Jiqiang Lu [and others] -- On the collision resistance of RIPEMD-160 / Florian Mendel [and others] -- Digital signatures -- Blind ring signatures secure under the chosen-target-CDH assumption / Javier Herranz, Fabien Laguillaumie -- Multi-party concurrent signatures / Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini -- Formal security model of multisignatures / Yuichi Komano [and others] -- Cryptanalysis of variants of UOV / Yuh-Hua Hu [and others] -- Stream ciphers -- TRIVIUM : a stream cipher construction inspired by block cipher design principles / Christophe De Cannière -- Cryptanalysis of the Bluetooth E₀ cipher using OBDD's / Yaniv Shaked, Avishai Wool -- Encryption I -- A partial key exposure attack on RSA using a 2-dimensional lattice / Ellen Jochemsz, Benne de Weger -- On the integration of public key data encryption and public key encryption with keyword search / Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo -- Collusion free policy-based encryption / Walid Bagga, Refik Molva.
|
505 |
1 |
|
|a Pervasive computing -- Using multiple smart cards for signing messages at malicious terminals / István Zsolt Berta -- Diverging keys in wireless sensor networks / Michal Ren, Tanmoy Kanti Das, Jianying Zhou -- Encryption II -- A generic transformation from symmetric to asymmetric broadcast encryption / Ulrich Huber, Ahmad-Reza Sadeghi -- Transparent image encryption using progressive JPEG / Thomas Stütz, Andreas Uhl -- Network security -- Preserving TCP connections across host address changes / Vassilis Prevelakis, Sotiris Ioannidis -- A security architecture for protecting LAN interactions / André Zúquete, Hugo Marques -- Simulation of Internet DDoS attacks and defense / Igor Kotenko, Alexander Ulanov -- SNOOZE : toward a Stateful NetwOrk prOtocol fuzZEr / Greg Banks [and others] -- Watermarking and DRM -- Rights protection for data cubes / Jie Guo [and others] -- An efficient probabilistic packet marking scheme (NOD-PPM) / Huifang Yin, Jun Li -- Intrusion detection and worms -- Resistance analysis to intruders' evasion of detecting intrusion / Jianhua Yang [and others] -- A wireless intrusion detection system for secure clustering and routing in ad hoc networks / Luciano Bononi, Carlo Tacconi -- Anomaly intrusion detection based on clustering a data stream / Sang-Hyun Oh [and others] -- Robust reactions to potential day-zero worms through cooperation and validation / K. Anagnostakis [and others] -- Key exchange -- An authentication and key exchange protocol for secure credential services / SeongHan Shin, Kazukuni Kobara, Hideki Imai -- A non-malleable group key exchange protocol robust against active insiders / Yvo Desmedt [and others] -- Security protocols and formal methods -- Formalising receipt-freeness / H.L. Jonker, E.P. de Vink -- Enhancing the security and efficiency of 3-D secure / Mohammed Assora, Ayoub Shirvani -- Designing and verifying core protocols for location privacy / David von Oheimb, Jorge Cuellar -- Information systems security -- Delegation in a distributed healthcare context : a survey of current approaches / Mila Katzarova, Andrew Simpson -- Managing information systems security : critical success factors and indicators to measure effectiveness / Jose M. Torres [and others]
|
583 |
1 |
|
|a committed to retain
|c 20230101
|d 20480101
|5 CoU
|f Alliance Shared Trust
|u https://www.coalliance.org/shared-print-archiving-policies.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008101458.
|
650 |
|
0 |
|a Computers
|x Access control
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2007008440.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484.
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779.
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 (OCoLC)fst01423772.
|
700 |
1 |
|
|a Katsikas, Sokratis K.
|0 http://id.loc.gov/authorities/names/nr97001917
|1 http://isni.org/isni/0000000054557630.
|
830 |
|
0 |
|a Lecture notes in computer science ;
|v 4176.
|0 http://id.loc.gov/authorities/names/n42015162.
|
907 |
|
|
|a .b41451533
|b 03-19-20
|c 02-09-07
|
998 |
|
|
|a pas
|b 02-14-07
|c -
|d m
|e -
|f eng
|g gw
|h 0
|i 2
|
907 |
|
|
|a .b41451533
|b 07-08-19
|c 02-09-07
|
944 |
|
|
|a MARS - RDA ENRICHED
|
907 |
|
|
|a .b41451533
|b 06-04-19
|c 02-09-07
|
907 |
|
|
|a .b41451533
|b 07-05-17
|c 02-09-07
|
948 |
|
|
|a bslw18/19 : jun : ess
|
999 |
f |
f |
|i 4dc958a9-3f78-5f98-9055-b5aa313a3778
|s 303f91f5-4f53-5d19-9f25-07b94b4d0f73
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Boulder Campus
|c Offsite
|d PASCAL Offsite
|e QA76.9.A25 I85 2006
|h Library of Congress classification
|i book
|m P203350107010
|n 1
|