Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : Deng, Robert H.
Titre(s) : Information Security Practice and Experience [Texte électronique] : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings / edited by Robert H. Deng, Tao Feng
Titre d'ensemble : Information security practice and experience
Publication : Berlin, Heidelberg : Springer, 2013
Description matérielle : 1 online resource (Online-Ressource (XIV, 388 p. 72 illus, digital).)
Collection : Lecture Notes in Computer Science ; 7863
Note(s) : This book constitutes the refereed proceedings of the 9th International Conference
on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China,
in May 2013. The 27 revised full papers presented were carefully reviewed and selected
from 71 submissions. The papers are organized in topical sections on network security;
identity-based cryptography; cryptographic primitives; security protocols; system
security; software security and DRM; and cryptanalysis and side channel attacks
Autre(s) auteur(s) : Feng, Tao. Fonction indéterminée
Deng, Robert H.. Fonction indéterminée
Sujet(s) : Informatique
Protection de l'information (informatique)
Chiffrement (informatique)
Indice(s) Dewey :
005.8 (23e éd.) = Sécurité informatique
Identifiants, prix et caractéristiques : ISBN 9783642380334
Identifiant de la notice : ark:/12148/cb44707033w
Notice n° :
FRBNF44707033
(notice reprise d'un réservoir extérieur)
Table des matières : Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion
Detection ; Trusted Identity Management for Overlay Networks ; Situational Awareness
for Improving Network Resilience Management ; Optimal Defense Strategies for DDoS
defender using Bayesian Game Model ; Identity-Based Cryptography ; Attribute Specified
Identity-Based Encryption ; Leakage-resilient Attribute-based Encryption with Fast
Decryption: Models, Analysis and Constructions ; Identity-based Multisignature with
Message Recovery ; Improving the Message-ciphertext Rate of Lewko's Fully Secure
IBE Scheme ; Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures
; A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release ;
About Hash into Montgomery Form Elliptic Curves ; Secure RFID Ownership Transfer
Protocols ; Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary
Input Model ; Expressing User Access Authorization Exceptions in Conven