close
1.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c1998  viii, 216 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1361
所蔵情報: loading…
2.

図書

図書
Jean-Jacques Quisquater ... [et al.]
出版情報: Berlin ; Tokyo : Springer, c1998  x, 375 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1485
所蔵情報: loading…
目次情報: 続きを見る
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior / H. Debar ; M. Dacier ; M. Nassehi ; A. Wespi
A Tool for Pro-active Defense Against the Buffer Overrun Attack / D. Bruschi ; E. Rosti ; R. Banfi
A Kernelized Architecture for Multilevel Secure Application Policies / S.N. Foley
Dealing with Multi-policy Security in Large Open Distributed Systems / C. Bidan ; V. Issarny
A Flexible Method for Information System Security Policy Specification / R. Ortalo
On the Security of Some Variants of the RSA Signature Scheme / M. Michels ; M. Stadler ; H.-M. Sun
Side Channel Cryptanalysis of Product Ciphers / J. Kelsey ; B. Schneier ; D. Wagner ; C. Hall
On the Security of Digital Tachographs / R. Anderson
An Authorization Model and Its Formal Semantics / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo
Authorization in CORBA Security / G. Karjoth
Rules for Designing Multilevel Object-Oriented Databases / F. Cuppens ; A. Gabillon
Byte Code Verification for Java Smart Cards Based on Model Checking / J. Posegga ; H. Vogt
Towards Formalizing the Java Security Architecture of JDK 1.2 / L. L. Kassab ; S. J. Greenwald
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets / A. Varvitsiotis ; D. Polemi ; A. Marsh
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in
DVD-Video / J.P.M.G. Linnartz ; J.C. Talstra
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle
Multimedia Distributed System / D. Augot ; J.-F. Delaigle ; C. Fontaine
The "Ticket" Concept for Copy Control Based on Embedded Signalling
Panel Session: Watermarking / G. Eizenberg ; J.-J. Quisquater
Authentication and Payment in Future Mobile Systems / G. Horn ; B. Preneel
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks / D. Kesdogan ; P. Reichl ; K. Junghartchen
A Mix-Mediated Anonymity Service and Its Payment / E. Franz ; A. Jerichow
A Subjective Metric of Authentication / A. Jøsang
A Sound Logic for Analysing Electronic Commerce Protocols / V. Kessler ; H. Neumann
Kerberos Version IV: Inductive Analysis of the Secrecy Goals / G. Bella ; L.C. Paulson
Author Index
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior / H. Debar ; M. Dacier ; M. Nassehi ; A. Wespi
A Tool for Pro-active Defense Against the Buffer Overrun Attack / D. Bruschi ; E. Rosti ; R. Banfi
A Kernelized Architecture for Multilevel Secure Application Policies / S.N. Foley
3.

図書

図書
Wolfgang Ehrenberger (ed.)
出版情報: Berlin : Springer, c1998  xvi, 392 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1516
所蔵情報: loading…
目次情報: 続きを見る
Formal Methods I - Analysis and Specification
CoRSA - A Constraint Based Approach to Requirements and Safety Analysis / K. Hollingworth ; A. Saeed
An Agenda for Specifying Software Components with Complex Data Models / K. Winter ; T. Santen ; M. Heisel
Safety in Production Cell Components: An Approach Combining Formal Real-Time Specifications and Patterns / H. Rust
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems / V. David ; J. Delcoigne ; E. Leret ; A. Ourghanlian ; P. Hilsenkopf ; P. Paris
Linking Hazard Analysis to Formal Specification and Design in B / K. Lano ; P. Kan ; A. Sanchez
Management and Human Factors
Controlling Your Design through Your Software Process / N. Martín-Vivaldi ; P. Isacsson
Operator Errors and Their Causes / T. Grams
Security
A Performance Comparison of Group Security Mechanisms / A. Hutchison ; M. Wallbaum
Towards Secure Downloadable Executable Content: The Java Paradigm / J. Iliadis ; S. Gritzalis ; V. Oikonomou
Model and Implementation of a Secure SW-Development Process for
Mission Critical Software / F. Dafelmair
Impact of Object-Oriented Software Engineering Applied to the Development of
Security Systems / S. Jovalekic ; B. Rist
Medical Informatics
'Profit by Safety' or Quackery in Biomedical Information Technology? / B.A. de Mol ; F. Koornneef
Formal Methods II - Languages and Verification
Towards Automated Proof of Fail-safe Behaviour / P. Liggesmeyer ; M. Rothfelder
Verifying a Time-Triggered Protocol in a Multi-language Environment / A. Merceron ; M. Müllerburg ; G.M. Pinna
Methods and Languages for Safety-Related Real-Time Programming / W.A. Halang ; A.H. Frigeri
ANSI-C in Safety Critical Applications - Lessons-Learned from Software Evaluation / A. Lindner
Applications
A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools / P. Bertoli ; A. Cimatti ; F. Giunchiglia ; P. Traverso
Applying Formal Methods in Industry - The UseGat Project / S. Bologna ; R. Bove ; G. Dipoppa ; G. Biondi ; G. Mongardi ; C. Porzia ; B.G. Mortensen ; N. Kirkegaard
Increasing System Safety for by-wire Applications in Vehicles by Using a Time-Triggered Architecture / Th. Ringler ; J. Steiner ; R. Belschner ; B. Hedenetz
Fault-Tolerant Communication in Large-Scale Manipulators / H.-D. Kochs ; W. Geisselhardt ; H. Hilmer ; M. Lenord
Distributed Fault-Tolerant and Safety-Critical Application in Vehicles - A Time-Triggered Approach / E. Dilger ; T. Fuehrer ; B. Müller
Model Checking Safety-Critical Software with SPIN: An Application to a Railway Interlocking System / D. Romano ; F. Torielli
EURIS, a Specification Method for Distributed Interlockings / F.v.Dijk ; W. Fokkink ; G. Kolk ; P.v.d.Ven ; B.v.Vlijmen
Object Oriented Safety Analysis of an Extra High Voltage Substation Bay / B. Nowicki ; J. Górski
Formal Methods III - Petri Nets
Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets / F. Saglietti
Safety Verification of Software Using Structured Petri Nets / K. Sacha
Reliability
Refinement of Safety-Related Hazards into Verifiable Code Assertions / K. Wong ; J. Joyce
A Conceptual Comparison of Two Commonly Used Safeguarding Principles / B. Knegtering ; A. Brombacher
A Holistic View on the Dependability of Software-Intensive Systems / G. Sonneck ; E. Schoitsch ; L. Strigini
Verifying Integrity of Decision Diagrams / R. Drechsler
Author Index
Formal Methods I - Analysis and Specification
CoRSA - A Constraint Based Approach to Requirements and Safety Analysis / K. Hollingworth ; A. Saeed
An Agenda for Specifying Software Components with Complex Data Models / K. Winter ; T. Santen ; M. Heisel
4.

図書

図書
Kazuo Ohta, Dingyi Pei (eds.)
出版情報: Berlin ; Tokyo : Springer, c1998  xii, 436 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1514
所蔵情報: loading…
5.

図書

図書
V. Michael Bove, Jr. ... [et al.], chairs/editors ; sponsored and publised by SPIE--The International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE--the International Society for Optical Engineering, c1998  viii, 432 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 3228
所蔵情報: loading…
6.

図書

図書
sponsored by Association for Computing Machinery Special Interest Group on Security, Audit, and Control, with support from United States Department of Defense, University of Newcastle upon Tyne
出版情報: New York : Association for Computing Machinery, c1998  vi, 116 p. ; 28 cm
所蔵情報: loading…
7.

図書

図書
David Aucsmith (ed.)
出版情報: Berlin : Springer, c1998  ix, 368 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1525
所蔵情報: loading…
8.

図書

図書
Eiji Okamoto, George Davida, Masahiro Mambo, (eds.)
出版情報: Berlin ; New York : Springer, c1998  xii, 356 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1396
所蔵情報: loading…
9.

図書

図書
Colin Boyd, Ed Dawson (eds.)
出版情報: Berlin : Springer, c1998  xi, 422 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1438
所蔵情報: loading…
10.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1998  xi, 262 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1431
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
Overview of elliptic curve cryptography / Kiyomichi Araki ; Takakazu Satoh ; Shinji Miura
Special Talk
Lattices and cryptography: An overview / Jacques Stern
Regular Contributions
A signcryption scheme with signature directly verifiable by public key / Feng Bao ; Robert H. Deng
Guaranteed correct sharing of integer factorization with off-line shareholders / Wenbo Mao
Lower bounds on term-based divisible cash systems / Tatsuaki Okamoto
Certifying trust / Ilari Lehti ; Pekka Nikander
On the security of server-aided RSA protocols / Johannes Merkle ; Ralph Werchner
On the security of ElGamal-based encryption / Yiannis Tsiounis
An authenticated Diffie-Hellman key agreement protocol secure against active attacks / Shouichi Hirose ; Susumu Yoshida
On the security of Girault's identification scheme / Shahrokh Saeednia ; Rei Safavi-Naini
A scheme for obtaining a message from the digital multisignature / Chin-Chen Chang ; Jyh-Jong Leu ; Pai-Cheng Huang ; Wei-Bin Lee
Secure hyperelliptic cryptosystems and their performance / Yasuyuki Sakai ; Kouichi Sakurai ; Hirokazu Ishizuka
A practical implementation of elliptic curve cryptosystems over GF(p) on a 16 bit microcomputer / Toshio Hasegawa ; Junko Nakajima ; Mitsuru Matsui
Two efficient algorithms for arithmetic of elliptic curves using Frobenius map / Jung Hee Cheon ; Sungmo Park ; Sangwoo Park ; Daeho Kim
Public-key cryptosystems using the modular group / Akihiro Yamamura
A cellular automaton based fast one-way hash function suitable for hardware implementation / Miodrag Mihaljević ; Yuliang Zheng ; Hideki Imai
A new hash function based on MDx-family and its application to MAC / Sang Uk Shin ; Kyung Hyune Rhee ; Dae Hyun Ryu ; Sang Jin Lee
Recent Results
Security issues for contactless smart cards / Michael W. David
Parameters for secure elliptic curve cryptosystem - improvements on Schoof's algorithm / Tetsuya Izu ; Jun Kogure ; Masayuki Noro ; Kazuhiro Yokoyama
A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme / Masahiro Mambo ; Hiroki Shizuya
Author Index
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼