close
1.

図書

図書
Moti Yung (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 626 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2442
所蔵情報: loading…
2.

図書

図書
Luís Caires ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xxv, 1477 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3580
所蔵情報: loading…
3.

図書

図書
Andrew S. Patrick, Moti Yung (eds.)
出版情報: Berlin : Springer, c2005  xii, 376 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3570
所蔵情報: loading…
4.

図書

図書
Jooseok Song, Taekyoung Kwon, Moti Yung (eds.)
出版情報: Berlin : Springer, c2006  xi, 378 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3786
所蔵情報: loading…
5.

図書

図書
Dengguo Feng, Dongdai Lin, Moti Yung (eds.)
出版情報: Berlin : Springer, c2005  xii, 420 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3822
所蔵情報: loading…
6.

図書

図書
ACNS ; Ioannidis, John ; Keromytis, Angelps ; Yung, Moti
出版情報: Berlin ; Tokyo : Springer, c2005  xi, 530 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3531
所蔵情報: loading…
7.

図書

図書
Chae Hoon Lim, Moti Yung (eds.)
出版情報: Berlin : Springer, c2005  xii, 472 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3325
所蔵情報: loading…
目次情報: 続きを見る
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Encrypted Watermarks and Linux Laptop Security / Markku-Juhani O. Saarinen
Inconsistency Detection of Authorization Policies in Distributed Component Environment / Chang-Joo Moon ; Hoh Peter In
Public Key Schemes I
Custodian-Hiding Verifiable Encryption / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong
Proving Key Usage / Malek Bechlaghem ; Vincent Rijmen
Public Key Encryption with Conjunctive Field Keyword Search / Dong Jin Park ; Kihyun Kim ; Pil Joong Lee
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior / Kohei Tatara ; Toshihiro Tabata ; Kouichi Sakurai
Service Discrimination and Audit File Reduction for Effective Intrusion Detection / Fernando Godínez ; Dieter Hutter ; Raúl Monroy
IDS False Alarm Filtering Using KNN Classifier / Kwok Ho Law ; Lam For Kwok
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking / Hae-Yeoun Lee ; Jong-Tae Kim ; Heung-Kyu Lee ; Young-Ho Suh
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment / Manabu Iwanaga
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups / Kui Ren ; Hyunrok Lee ; Kwangjo Kim ; Taewhan Yoo
A Ring Signature Scheme Using Bilinear Pairings / Jing Xu ; Zhenfeng Zhang ; Dengguo Feng
Verifiable Pairing and Its Applications / Sherman S.M. Chow
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading / Bart Haagdorens ; Tim Vermeiren ; Marnix Goossens
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks / Seok Bong Jeong ; Young Woo Choi ; Sehun Kim
Application of Content Computing in Honeyfarm / Yi-Yuan Huang ; Kwok-Yan Lam ; Siu-Leung Chung ; Chi-Hung Chi ; Jia-Guang Sun
Digital Rights Management
License Protection with a Tamper-Resistant Token / Cheun Ngen Chong ; Bin Ren ; Jeroen Doumen ; Sandro Etalle ; Pieter H. Hartel ; Ricardo Corin
An Adaptive Approach to Hardware Alteration for Digital Rights Management / Yinyan Yu ; Zhi Tang
Dynamic Fingerprinting over Broadcast Using Revocation Scheme / Mira Kim ; Kazukuni Kobara ; Hideki Imai
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels / Chong Hee Kim ; Yong Ho Hwang
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002 / Sang Cheol Hwang ; Dong Hoon Lee ; Daewan Han ; Jae-Cheol Ryou
Fair Offline Payment Using Verifiable Encryption / Sangjin Kim ; Heekuck Oh
A Limited-Use Key Generation Scheme for Internet Transactions / Supakorn Kungpisdan ; Phu Dung Le ; Bala Srinivasan
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes / Kishan Chand Gupta ; Palash Sarkar
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II / Soonhak Kwon
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors / Masanobu Katagi ; Izuru Kitamura ; Toru Akishita ; Tsuyoshi Takagi
Hyperelliptic Curve Coprocessors on a FPGA / HoWon Kim ; Thomas Wollinger ; YongJe Choi ; KyoIl Chung ; Christof Paar
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID / Kenji Imamoto
A New k-Anonymous Message Transmission Protocol / Gang Yao
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack / Marcin Gomulkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
Side-Channel Attacks
Side Channel Cryptanalysis on SEED / HyungSo Yoo ; ChangKyun Kim ; JaeCheol Ha ; SangJae Moon ; IlHwan Park
Secure and Efficient AES Software Implementation for Smart Cards / Elena Trichina ; Lesya Korkishko
Practical Template Attacks / Christian Rechberger ; Elisabeth Oswald
Evaluation and Improvement of the Tempest Fonts / Hidema Tanaka ; Osamu Takizawa ; Akihiro Yamamura
Author Index
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
8.

図書

図書
Moti Yung ... [et al.] (eds.)
出版情報: Berlin : Springer, c2006  xiv, 542 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3958
所蔵情報: loading…
9.

図書

図書
Jianying Zhou, Moti Yung, Feng Bao (eds.)
出版情報: Berlin : Springer, c2006  xiv, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3989
所蔵情報: loading…
10.

図書

図書
Reihaneh Safavi-Naini, Moti Yung (eds.)
出版情報: Berlin : Springer, c2006  xi, 355 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3919
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼