My Library

University LibraryCatalogue

     
Limit search to items available for borrowing or consultation
Record 2 of 8
Result Page: Previous Next
Can't find that book? Try BONUS+
 
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

E-RESOURCE
Author ISPEC 2012 (2012 : Hangzhou, China)

Title Information security practice and experience : 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings / Mark D. Ryan, Ben Smyth, Guilin Wang (eds.).

Published Berlin ; New York : Springer, ©2012.

Copies

Location Call No. Status
 UniM INTERNET resource    AVAILABLE
Physical description 1 online resource (xiii, 406 pages).
Series Lecture notes in computer science, 0302-9743 ; 7232
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7232.
LNCS sublibrary. SL 4, Security and cryptology.
Springer Lecture Notes in Computer Science
Bibliography Includes bibliographical references and author index.
Contents A Pre-computable Signature Scheme with Efficient Verification for RFID / Fuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan -- Redactable Signatures for Independent Removal of Structure and Content / Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring / Xianhui Lu, Bao Li, Qixiang Mei and Yamin Liu -- Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack / Chong-zhi Gao, Dongqing Xie and Baodian Wei -- Computational Soundness of Indistinguishability Properties without Computable Parsing / Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto and Hideki Sakurada -- New Impossible Differential Attacks on Camellia / Dongxia Bai and Leibo Li -- Impossible Differential Attacks on Reduced-Round LBlock / Ya Liu, Dawu Gu, Zhiqiang Liu and Wei Li -- New Truncated Differential Cryptanalysis on 3D Block Cipher / Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta.
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings / Christian L.F. Corniaux and Hossein Ghodosi -- A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions / Preetha Mathew K., Sachin Vasant, Sridhar Venkatesan and C. Pandu Rangan -- Towards Fine-Grained Access Control on Browser Extensions / Lei Wang, Ji Xiang, Jiwu Jing and Lingchen Zhang -- Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family / Yang-Wai Chow and Willy Susilo -- High-Entropy Visual Identification for Touch Screen Devices / Nathaniel Wesley Filardo and Giuseppe Ateniese -- A Framework for Security Analysis of Key Derivation Functions / Chuah Chai Wen, Edward Dawson, Juan Manuel González Nieto and Leonie Simpson -- On the Equivalence of Two Definitions of Visual Cryptography Scheme / Teng Guo, Feng Liu and ChuanKun Wu -- Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing / Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi and Tsuyoshi Takagi -- Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks / Kazuya Izawa, Atsuko Miyaji and Kazumasa Omote.
iPIN and mTAN for Secure eID Applications / Johannes Braun, Moritz Horsch and Alexander Wiesmaier -- Secure Distributed Computation of the Square Root and Applications / Manuel Liedel -- Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization / Tian Shuo, He Yeping and Ding Baozeng -- Structure-Based RSA Fault Attacks / Benjamin Michéle, Juliane Krämer and Jean-Pierre Seifert -- Fault Analysis of the KATAN Family of Block Ciphers / Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry -- Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher / Yanfeng Wang, Wenling Wu and Xiaoli Yu -- On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers / Zhenfei Zhang, Thomas Plantard and Willy Susilo -- Partial Key Exposure on RSA with Private Exponents Larger Than N / Marc Joye and Tancrède Lepoint -- Linear Cryptanalysis of Reduced-Round ICEBERG / Yue Sun and Meiqin Wang -- Overcoming Significant Noise: Correlation-Template-Induction Attack / An Wang, Man Chen, Zongyue Wang and Yaoling Ding.
Part 1. Spatio (Temporal) Data Modeling and Visualisation -- Usability of Spatio-Temporal Uncertainty Visualisation Methods / Hansi Senaratne, Lydia Gerharz, Edzer Pebesma and Angela Schwering -- Line Simplification in the Presence of Non-Planar Topological Relationships / Padraig Corcoran, Peter Mooney and Michela Bertolotto -- Critical Remarks on the Use of Conceptual Schemas in Geospatial Data Modelling-A Schema Translation Perspective / Tatjana Kutzner and Andreas Donaubauer -- Part 2. Spatial Data Infrastructures, Geo Web Services and Geo Semantic Web -- Towards an Active Directory of Geospatial Web Services / Francisco J. Lopez-Pellicer, Walter Rentería-Agualimpia, Javier Nogueras-Iso, F. Javier Zarazaga-Soria and Pedro R. Muro-Medrano -- Spatial Sensor Web for the Prediction of Electric Power Supply System Behaviour / Miloš Bogdanović, Nataša Veljković and Leonid Stoimenov -- Live Geoinformation with Standardized Geoprocessing Services / Theodor Foerster, Bastian Baranski and Harald Borsutzky -- Interlinking Geospatial Information in the Web of Data / Luis M. Vilches-Blázquez, Víctor Saquicela and Oscar Corcho -- Part 3. Modelling and Management of Uncertainty, Spatio (Temporal) Data Quality and Metadata -- QualESTIM: Interactive Quality Assessment of Socioeconomic Data Using Outlier Detection / Christine Plumejeaud and Marlène Villanova-Oliver -- Distributed Integration of Spatial Data with Different Positional Accuracies / Alberto Belussi and Sara Migliorini -- Through a Fuzzy Spatiotemporal Information System for Handling Excavation Data / Asma Zoghlami, Cyril de Runz, Herman Akdag and Dominique Pargny -- Part 4. Mobility of Persons, Objects and Systems, Transports and Flows -- Using Weather Information to Improve Route Planning / Paul Litzinger, Gerhard Navratil, Åke Sivertun and Daniela Knorr -- Simulation of Laser Attacks against Aircrafts / Václav Talhofer, Teodor Baláž, František Racek, Alois Hofmann and Šárka Hošková-Mayerová -- Automated Traffic Route Identification Through the Shared Nearest Neighbour Algorithm / Maribel Yasmina Santos, Joaquim P. Silva, João Moura-Pires and Monica Wachowicz -- Part 5. Spatial Analysis, Geostatistics, and Geo Information Retrieval -- Comparing Support Vector Regression and Statistical Linear Regression for Predicting Poverty Incidence in Vietnam / Cornelius Senf and Tobia Lakes -- Do Expressive Geographic Queries Lead to Improvement in Retrieval Effectiveness? / Damien Palacio, Christian Sallaberry, Guillaume Cabanac, Gilles Hubert and Mauro Gaio -- The GP-SET Method: A Spatial and Temporal Probabilistic Model for Geoprospective / Stéphane Bourrelly and Christine Voiron-Canicio -- Part 6. Modelling and Spatial Analysis of Urban Dynamics, Urban GIS -- Predicting Spatiotemporal Distribution of Transient Occupants in Urban Areas / Toshihiro Osaragi and Takeshi Hoshino -- Towards Urban Fabrics Characterization Based on Buildings Footprints / Rachid Hamaina, Thomas Leduc and Guillaume Moreau -- The Use of Point Pattern Statistics in UrbanAnalysis / Ioannis Pissourios, Pery Lafazani, Stavros Spyrellis, Anastasia Christodoulou and Myron Myridis -- Part 7. GIS and Spatial Analysis for Global Change Modelling, Impact on Space -- Beach-Dune Morphological Relationships at Youghal Beach, Cork / Sarah Kandrot -- A New Method for Computing the Drainage Network Based on Raising the Level of an Ocean Surrounding the Terrain / Salles V.G. Magalhães, Marcus V.A. Andrade, W. Randolph Franklin and Guilherme C. Pena -- Part 8. Geographic Information Science: Links with other Disciplines and Citizens -- Geographic Information Science as a Common Cause for Interdisciplinary Research / Thomas Blaschke, Josef Strobl, Lothar Schrott, Robert Marschallinger and Franz Neubauer, et al. -- Enhancing the Quality of Volunteered Geographic Information: A Constraint-Based Approach / Olga Yanenko and Christoph Schlieder.
Summary Annotation This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.
Other author Ryan, Mark, 1962-
Smyth, Ben.
Wang, Guilin, Dr.
SpringerLink issuing body.
Subject Computer security -- Congresses.
Computer networks -- Security measures -- Congresses.
Data encryption (Computer science) -- Congresses.
Computer science.
Computer Communication Networks.
Data protection.
Data encryption (Computer science)
Information storage and retrieval systems.
Information Systems.
Systems and Data Security.
Information Storage and Retrieval.
Computers and Society.
Management of Computing and Information Systems.
Electronic books.
Conference papers and proceedings.
Variant Title ISPEC 2012
ISBN 9783642291012
3642291015
9783642291005