close
1.

図書

図書
John A. Clark ... [et. al] (eds.)
出版情報: Berlin : Springer, c2006  x, 242 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3934
所蔵情報: loading…
2.

図書

図書
Moti Yung ... [et al.] (eds.)
出版情報: Berlin : Springer, c2006  xiv, 542 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3958
所蔵情報: loading…
3.

図書

図書
Dongho Won, Seungjoo Kim (eds.)
出版情報: Berlin : Springer, c2006  xiv, 458 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3935
所蔵情報: loading…
4.

図書

図書
Dieter Gollmann, Jan Meier, Andrei Sabelfeld (eds.)
出版情報: Berlin : Springer, c2006  xi, 548 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4189
所蔵情報: loading…
5.

図書

図書
Min Surp Rhee, Byoungcheon Lee (eds.)
出版情報: Berlin : Springer, c2006  xiii, 358 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4296
所蔵情報: loading…
6.

図書

図書
George Danezis, Philippe Golle (eds.)
出版情報: Berlin : Springer, 2006  viii, 429 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4258
所蔵情報: loading…
7.

図書

図書
Shai Halevi, Tal Rabin (eds.)
出版情報: Berlin : Springer, c2006  xi, 616 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3876
所蔵情報: loading…
8.

図書

図書
David Pointcheval (ed.)
出版情報: Berlin : Springer, c2006  xi, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3860
所蔵情報: loading…
9.

図書

図書
Sokratis K. Katsikas ... [et al.] (eds.)
出版情報: Berlin : Springer, c2006  xiv, 548 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4176
所蔵情報: loading…
目次情報: 続きを見る
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
Privacy and Anonymity
Low Latency Anonymity with Mix Rings / Matthew Burnside ; Angelos D. Keromytis
Breaking Four Mix-Related Schemes Based on Universal Re-encryption / George Danezis
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy / Maurizio Atzori
Protecting Data Privacy Through Hard-to-Reverse Negative Databases / Fernando Esponda ; Elena S. Ackley ; Paul Helman ; Haixia Jia ; Stephanie Forrest
Block Ciphers and Hash Functions
Related-Key Rectangle Attack on 42-Round SHACAL-2 / Jiqiang Lu ; Jongsung Kim ; Nathan Keller ; Orr Dunkelman
On the Collision Resistance of RIPEMD-160 / Florian Mendel ; Norbert Pramstaller ; Christian Rechberger ; Vincent Rijmen
Digital Signatures
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption / Javier Herranz ; Fabien Laguillaumie
Multi-party Concurrent Signatures / Dongvu Tonien ; Willy Susilo ; Reihaneh Safavi-Naini
Formal Security Model of Multisignatures / Yuichi Komano ; Kazuo Ohta ; Atsushi Shimbo ; Shinichi Kawamura
Cryptanalysis of Variants of UOV / Yuh-Hua Hu ; Chun-Yen Chou ; Lih-Ghung Wang ; Feipei Lai
Stream Ciphers
Trivium: a Stream Cipher Construction Inspired by Block Cipher Design Principles / Christophe De Canniere
Cryptanalysis of the Bluetooth E[subscrpit o] Cipher Using OBDD's / Yaniv Shaked ; Avishai Wool
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice / Ellen Jochemsz ; Benne de WegerEncryption I:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search / Joonsang Baek
Collusion-Free Policy-Based Encryption / Walid Bagga ; Refik Molva
Pervasive Computing
Using Multiple Smart Cards for Signing Messages at Malicious Terminals / Istvan Zsolt Berta
Diverging Keys in Wireless Sensor Networks / Michal Ren ; Tanmoy Kanti Das ; Jianying Zhou
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption / Ulrich Huber ; Ahmad-Reza SadeghiEncryption II:
Transparent Image Encryption Using Progressive JPEG / Thomas Stutz ; Andreas Uhl
Network Security
Preserving TCP Connections Across Host Address Changes / Vassilis Prevelakis ; Sotiris Ioannidis
A Security Architecture for Protecting LAN Interactions / Andre Zuquete ; Hugo Marques
Simulation of Internet DDoS Attacks and Defense / Igor Kotenko ; Alexander Ulanov
Snooze: Toward a Stateful NetwOrk prOtocol fuzZEr / Greg Banks ; Marco Cova ; Viktoria Felmetsger ; Kevin Almeroth ; Richard Kemmerer
Watermarking and DRM
Rights Protection for Data Cubes / Jie Guo ; Yingjiu Li ; Robert H. Deng ; Kefei Chen
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) / Huifang Yin ; Jun Li
Intrusion Detection and Worms
Resistance Analysis to Intruders' Evasion of Detecting Intrusion / Jianhua Yang ; Yongzhong Zhang ; Shou-Hsuan Stephen Huang
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks / Luciano Bononi ; Carlo Tacconi
Anomaly Intrusion Detection Based on Clustering a Data Stream / Sang-Hyun Oh ; Jin-Suk Kang ; Yung-Cheol Byun ; Taikyeong T. Jeong ; Won-Suk Lee
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation / K. Anagnostakis ; S. Ioannidis ; A.D. Keromytis ; M.B. Greenwald
Key Exchange
An Authentication and Key Exchange Protocol for Secure Credential Services / SeongHan Shin ; Kazukuni Kobara ; Hideki Imai
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders / Yvo Desmedt ; Josef Pieprzyk ; Ron Steinfeld ; Huaxiong Wang
Security Protocols and Formal Methods
Formalising Receipt-Freeness / H.L. Jonker ; E.P. de Vink
Enhancing the Security and Efficiency of 3-D Secure / Mohammed Assora ; Ayoub Shirvani
Designing and Verifying Core Protocols for Location Privacy / David von Oheimb ; Jorge Cuellar
Information Systems Security
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches / Mila Katzarova ; Andrew Simpson
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness / Jose M Torres ; Jose M Sarriegi ; Javier Santos ; Nicolas Serrano
Author Index
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼