Information security and cryptology - ICISC 2007 : 10th international conference, Seoul, Korea, November 29-30, 2007 ; proceedings / Kil-Hyun Nam, Gwangsoo Rhee (eds.).
Contributor(s): Won, Dongho.Material type: TextSeries: Springer.Lecture notes in computer science: 4817.Publisher: Berlin : Springer, 2007Description: 1 online resource (xiii, 366 p.) : ill.ISBN: 9783540767886; 3540767886; 9783540767879; 3540767878.Subject(s): Computer security -- Congresses | Cryptography -- CongressesAdditional physical formats: Print version:: Information security and cryptology - ICISC 2007.LOC classification: QA76.9.A25 | I32 2007Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25 I32 2007 (Browse shelf)||http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/978-3-540-76788-6||Available||ocn191471255|
International conference proceedings.
Includes bibliographical references.
Front Matter; Cryptanalysis of a Hash Function Proposed at ICISC 2006; Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006; A Cryptanalysis of the Double-Round Quadratic Cryptosystem; A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment; Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments; Handling Dynamic Information Release; Improving the Time Complexity of Matsui's Linear Cryptanalysis; On Large Distributions for Linear Cryptanalysis.
This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorizat.
Description based on print version record.