000 -LEADER |
fixed length control field |
04353nam a22005295i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310144113.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
121116s2012 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642354168 |
|
978-3-642-35416-8 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.5-5105.9 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.6 |
Edition number |
23 |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg : |
-- |
Imprint: Springer, |
-- |
2012. |
912 ## - |
-- |
ZDB-2-SCS |
|
-- |
ZDB-2-LNC |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Lee, Dong Hoon. |
Relator term |
editor. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Information Security Applications |
Medium |
[electronic resource] : |
Remainder of title |
13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers / |
Statement of responsibility, etc |
edited by Dong Hoon Lee, Moti Yung. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XII, 371 p. 135 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Lecture Notes in Computer Science, |
International Standard Serial Number |
0302-9743 ; |
Volume number/sequential designation |
7690 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks on Reduced-Round MISTY1.- Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.- Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity.- Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.- Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption.- Improved Differential Fault Analysis on Block Cipher ARIA.- Multi-Level Controlled Signature.- Tate Pairing Computation on Generalized Hessian Curves -- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model.- An Authentication and Key Management Scheme for the Proxy Mobile IPv6.- Payment Approval for PayWord -- Anonymity-Based Authenticated Key Agreement with Full Binding Property.- A Study for Classification of Web Browser Log and Timeline Visualization.- Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT Investigations.- An Efficient Filtering Method for Detecting Malicous Web Pages.- Lightweight Client-Side Methods for Detecting Email Forgery.- AIGG Threshold Based HTTP GET Flooding Attack Detection.- Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.- Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice.- On Trigger Detection against Reactive Jamming Attacks: A Localized Solution.- Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs.- A Trust Management Model for QoS-Based Service Selection.- Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Data encryption (Computer science). |
|
Topical term or geographic name as entry element |
Computer software. |
|
Topical term or geographic name as entry element |
Information Systems. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Algorithm Analysis and Problem Complexity. |
|
Topical term or geographic name as entry element |
Data Encryption. |
|
Topical term or geographic name as entry element |
Management of Computing and Information Systems. |
|
Topical term or geographic name as entry element |
Information Systems Applications (incl. Internet). |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Yung, Moti. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642354151 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-3-642-35416-8 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |