000 -LEADER |
fixed length control field |
04269nam a22005415i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310144054.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
101101s2010 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642168253 |
|
978-3-642-16825-3 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg, |
-- |
2010. |
912 ## - |
-- |
ZDB-2-SCS |
|
-- |
ZDB-2-LNC |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Echizen, Isao. |
Relator term |
editor. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Advances in Information and Computer Security |
Medium |
[electronic resource] : |
Remainder of title |
5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings / |
Statement of responsibility, etc |
edited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XIII, 371p. 83 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Lecture Notes in Computer Science, |
International Standard Serial Number |
0302-9743 ; |
Volume number/sequential designation |
6434 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Invited Talks -- Automating Security Configuration and Administration: An Access Control Perspective -- Security Metrics and Security Investment Models -- Encryption -- Publishing Upper Half of RSA Decryption Exponent -- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples -- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model -- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme -- Data and Web Security -- Practical Universal Random Sampling -- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints -- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel -- Validating Security Policy Conformance with WS-Security Requirements -- Protocols -- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption -- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage -- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE -- Network Security -- A Generic Binary Analysis Method for Malware -- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs -- Securing MANET Multicast Using DIPLOMA -- Block Cipher -- Preimage Attacks against Variants of Very Smooth Hash -- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification -- Mutual Information Analysis under the View of Higher-Order Statistics -- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter -- Implementation and Real Life Security -- Differential Addition in Generalized Edwards Coordinates -- Efficient Implementation of Pairing on BREW Mobile Phones -- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases -- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book constitutes the refereed proceedings of the 5th International Workshop on Security, IWSEC 2010, held in Kobe, Japan, in November 2010. The 22 revised full papers presented together with 2 invited talk were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on encryption, data and web security, protocols, network security, block cipher, and implementation and real life security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Data encryption (Computer science). |
|
Topical term or geographic name as entry element |
Computer software. |
|
Topical term or geographic name as entry element |
Information Systems. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
|
Topical term or geographic name as entry element |
Management of Computing and Information Systems. |
|
Topical term or geographic name as entry element |
Data Encryption. |
|
Topical term or geographic name as entry element |
Computers and Society. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Algorithm Analysis and Problem Complexity. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kunihiro, Noboru. |
Relator term |
editor. |
|
Personal name |
Sasaki, Ryoichi. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642168246 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-3-642-16825-3 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |