close
1.

図書

図書
Moti Yung (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 626 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2442
所蔵情報: loading…
2.

図書

図書
Antonio Lioy, Daniele Mazzocchi (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 263 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2828
所蔵情報: loading…
目次情報: 続きを見る
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection
Network Security
Securing the Border Gateway Protocol: A Status Update / Stephen T. Kent
Towards an IPv6-Based Security Framework for Distributed Storage Resources / Alessandro Bassi ; Julien Laganier
Operational Characteristics of an Automated Intrusion Response System / Maria Papadaki ; Steven Furnell ; Benn Lines ; Paul Reynolds
Mobile and Wireless Network Security
A Secure Multimedia System in Emerging Wireless Home Networks / Nut Taesombut ; Richard Huang ; Venkat P. Rangan
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents / Yusuke Sakabe ; Masakazu Soshi ; Atsuko Miyaji
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems / Michelle S. Wangham ; Joni da Silva Fraga ; Rafael R. Obelheiro
Trust and Privacy
Privacy and Trust in Distributed Networks / Thomas Rossler ; Arno Hollosi
Extending the SDSI / SPKI Model through Federation Webs / Altair Olivo Santin ; Carlos Maziero
Trust-X: An XML Framework for Trust Negotiations / Elisa Bertino ; Elena Ferrari ; Anna C. Squicciarini
Application Security
How to Specify Security Services: A Practical Approach / Javier Lopez ; Juan J. Ortega ; Jose Vivas ; Jose M. Troya
Application Level Smart Card Support through Networked Mobile Devices / Pierpaolo Baglietto ; Francesco Moggia ; Nicola Zingirian ; Massimo Maresca
Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage / Kuan W. Yip
Multimedia Security
Selective Encryption of the JPEG2000 Bitstream / Roland Norcen ; Andreas Uhl
Robust Spatial Data Hiding for Color Images / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
Watermark Security via Secret Wavelet Packet Subband Structures / Werner Dietl
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression / David Megias ; Jordi Herrera-Joancomarti ; Julià Minguillón
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs / G.S. Poh
Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization / Bubi G. Flepp-Stars ; Herbert Stogner
Author Index
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
3.

図書

図書
Ed Dawson, Andrew Clark, Colin Boyd (eds.)
出版情報: Berlin : Springer, c2000  xii, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1841
所蔵情報: loading…
4.

図書

図書
Mihir Bellare (ed.)
出版情報: Berlin : Springer, c2000  xi, 543 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1880
所蔵情報: loading…
目次情報: 続きを見る
XTR and NTRU
The XTR Pubhc Key System / Arjen K. Lenstra ; Eric R. Verheul
A Chosen-Ciphertext Attack against NTRU / Eliane Jaulmes ; Antoine Joux
Privacy for Databases
Privacy Preserving Data Mining / Yehuda Lindell ; Benny Pinkas
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing / Arnos Beimel ; Yuval Ishai ; Tal Malkin
Secure Distributed Computation and Applications
Parallel Reducibility for Information-Theoretically Secure Computation / Yevgeniy Dodis ; Silvio Micali
Optimistic Fair Secure Computation / Christian Cachin ; Jan Camenisch
A Cryptographic Solution to a Game Theoretic Problem / Shai Halevi ; Tal Rahin
Algebraic Cryptosystems
Differential Fault Attacks on Elliptic Curve Cryptosystems / Ingrid Bichl ; Bernd Meyer ; Volker Müller
Quantum Public-Key Cryptosystems / Tatsuaki Okamoto ; Keisuke Tanaka ; Shigenori Uchiyama
New Public-Key Cryptosystem Using Braid Groups / Ki Hyoung Ko ; Sang Jin Lee ; Jung Hee Cheon ; Jae Woo Han ; Ju-sung Kang ; Choonsik Park
Message Authentication
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm / Don Coppersmith ; Lars R. Knudsen ; Chris J. Mitchell
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions / John Black ; Phillip Rogaway
L-colhsion Attacks against Randomized MACs / Michael Semanko
Digital Signatures
On the Exact Security of Full Domain Hash / Jean-Sébastien Coron
Timed Commitments / Dan Boneh ; Moni Naor
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme / Giuseppe Ateniese ; Marc Joye ; Gene Tsudik
Provably Secure Partially Blind Signatures / Masayuki Abe
Cryptanalysis
Weaknesses in the SL2(<$>{\rm IF}_{2^n}<$>) Hashing Scheme / Rainer Steinwandt ; Markus Grassl ; Willi Geiselmann ; Thomas Beth
Fast Correlation Attacks through Reconstruction of Linear Polynomials / Thomas Johansson ; Fredrik Jönsson
Traitor Tracing and Broadcast Encryption
Sequential Traitor Tracing / Reihaneh Safavi-Naini ; Yejing Wang
Long-Lived Broadcast Encryption / Juan A. Garay ; Jessica Staddon ; Avishai Wool
Invited Talk
Taming the Adversary / Martín Abadi
Symmetrie Encryption
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search / Anand Desai
On the Round Security of Symmetrie-Key Cryptographic Primitives / Zulfikar Ramzan ; Leonid Reyzin
New Paradigms for Constructing Symmetrie Encryption Schemes Secureagainst Chosen-Ciphertext Attack
To Commit or Not to Commit
Efficient Non-malleable Commitment Schemes / Marc Fischlin ; Roger Fischlin
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption / Ivan Damgård ; Jesper Buus Nielsen
Protocols
A Note on the Round-Complexity of Concurrent Zero-Knowledge / Alan Rosen
An Improved Pseudo-random Generator Based on Discrete Log / Rosario Gennaro
Linking Classical and Quantum Key Agreement: Is There ``Bound Information''? / Nicolas Gisin ; Stefan Wolf
Stream Ciphers and Boolean Functions
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers / Muxiang Zhang ; Agnes Chan
Nonlinearity Bounds and Constructions of Resilient Boolean Functions / Palash Sarkar ; Subhamoy Maitra
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications / Jürgen Bierbrauer ; Holger Schellwat
Author Index
XTR and NTRU
The XTR Pubhc Key System / Arjen K. Lenstra ; Eric R. Verheul
A Chosen-Ciphertext Attack against NTRU / Eliane Jaulmes ; Antoine Joux
5.

図書

図書
Frédéric Cuppens ... [et al.]
出版情報: Berlin : Springer, c2000  x, 323 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1895
所蔵情報: loading…
6.

図書

図書
Hervé Debar, Ludovic Mé, S. Felix Wu (eds.)
出版情報: Berlin : Springer, c2000  x, 225 p. ; ill. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1907
所蔵情報: loading…
目次情報: 続きを見る
Logging
Better Logging through Formality / Chapman Flack ; Mikhail J. Atallah
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions / Josué Kuri ; Gonzalo Navarro ; Ludovic Mé ; Laurent Heye
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection / Joachim Biskup ; Ulrich Flegel
Data Mining
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions / Wenke Lee ; Rahul A. Nimbalkar ; Kam K. Yee ; Sunil B. Patil ; Pragneshkumar H. Desai ; Thuan T. Tran ; Salvatore J. Stolfo
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report / Christoph Michael ; Anup Ghosh
Modeling Process Behavior
Adaptive, Model-Based Monitoring for Cyber Attack Detection / Alfonso Valdes ; Keith Skinner
A Real-Time Intrusion Detection System Based on Learning Program Behavior / Anup K. Ghosh ; Michael Schatz
Intrusion Detection Using Variable-Length Audit Trail Patterns / Andreas Wespi ; Marc Dacier ; Hervé Debar
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects / Zakia Marrakchi ; Bernard Vivinis ; Benjamin Morin
IDS Evaluation
The 1998 Lincoln Laboratory IDS Evaluation (A Critique) / John McHugh
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation / Richard Lippmann ; Joshua W. Haines ; David J. Fried ; Jonathan Korba ; Kumar Das
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems / Dominique Alessandri
Modeling
LAMBDA: A Language to Model a Database for Detection of Attacks / Frederic Cuppens ; Rodolphe Ortalo
Target Naming and Service Apoptosis / James Riordan
Author Index
Logging
Better Logging through Formality / Chapman Flack ; Mikhail J. Atallah
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions / Josué Kuri ; Gonzalo Navarro ; Ludovic Mé ; Laurent Heye
7.

図書

図書
Andreas Wespi, Giovanni Vigna, Luca Deri (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  x, 326 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2516
所蔵情報: loading…
8.

図書

図書
Maria Marinaro, Roberto Tagliaferri (eds.)
出版情報: Berlin : Springer, c2002  ix, 252 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2486
所蔵情報: loading…
目次情報: 続きを見る
Review Papers
Ensembles of Learning Machines / Giorgio Valentini ; Francesco Masulli
Eduardo R. Caianiello Lecture
Learning Preference Relations from Data / Theodoros Evgniou ; Massimiliano Pontil
Francesco E. Lauria Lecture
Increasing the Biological Inspiration of Neural Networks / Francesco E. Lauria
Architectures and Algorithms
Hybrid Automatic Trading Systems: Technical Analysis & Group Method of Data Handling / Marco Corazza ; Paolo Vanni ; Umberto Loschi
Interval TOPSIS for Multicriteria Decision Making / Silvio Giove
A Distributed Algorithm for Max Independent Set Problem Based on Hopfield Networks / Giuliano Grossi ; Roberto Posenato
Extended Random Neural Networks / G. Martinelli ; F. M. Frattale Mascioli ; M. Panella ; A. Rizzi
Generalized Independent Component Analysis as Density Estimation / Francesco Palmieri ; Alessandra Budillon
Spline Recurrent Neural Networks for Quad-Tree Video Coding / Lorenzo Topi ; Raffaele Parisi ; Aurelio Uncini
MLP Neural Network Implementation on a SIMD Architecture / Salvatore Vitabile ; Antonio Gentile ; G. B. Dammone ; Filippo Sorbello
Image and Signal Processing
A New Approach to Detection of Muscle Activation by Independent Component Analysis and Wavelet Transform / Bruno Azzerboni ; Giovanni Finocchio ; Maurizio Ipsale ; Fabio La Foresta ; Francesco Carlo Morabito
Learning to Balance Upright Posture: What can be Learnt Using Adaptive NN Models? / N. Alberto Borghese
Detection of Facial Features / Paola Campadelli ; Elena Casiraghi ; Raffaella Lanzarotti
A Two Stage Neural Architecture for Segmentation and Superquadrics Recovery from Range Data / Antonio Chella ; Roberto Pirrone
Automatic Discrimination of Earthquakes and False Events in Seismological Recording for Volcanic Monitoring / E. C. Ezin ; Flora Giudicepietro ; Simona Petrosino ; S. Scarpetta ; A. Vanacore
A Comparison of Signal Compression Methods by Sparse Solution of Linear Systems / Davide Mattera ; Michele Di Monte
Fuzzy Time Series for Forecasting Pollutants Concentration in the Air / Mario Versaci
Real-Time Perceptual Coding of Wideband Speech by Competitive Neural Networks / Eros Pasero ; Alfonso Montuori
Sound Synthesis by Flexible Activation Function Recurrent Neural Networks
Special Session on "Learning in Neural Networks: Limitations and Future Trends" Chaired by Marco Gori Mathematical Modelling of Generalization / Martin Anthony
Structural Complexity and Neural Networks / Alberto Bertoni ; Beatrice Palano
Bayesian Learning Techniques: Application to Neural Networks with Constraints on Weight Space / A. Eleuteri ; R. Tagliaferri ; L. Milano ; F. Acernese ; M. De Laurentiis
A Short Review of Statistical Learning Theory
Author Index / Domenico Parisi
Review Papers
Ensembles of Learning Machines / Giorgio Valentini ; Francesco Masulli
Eduardo R. Caianiello Lecture
9.

図書

図書
Yvo G. Desmedt (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xi, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2567
所蔵情報: loading…
目次情報: 続きを見る
Diffie-Hellman Based Schemes
Efficient Construction of (Distributed) Verifiable Random Functions / Yevgeniy Dodis
An Identity-Based Signature from Gap Diffie-Hellman Groups / Jae Choon Cha ; Jung Hee Cheon
Threshold Cryptography
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme / Alexandra Boldyreva
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack / Philip MacKenzie
Reduction Proofs
On the Bit Security of NTRUEncrypt / Mats Näslund ; Igor E. Shparlinski ; William Whyte
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks / Yodai Watanabe ; Junji Shikata ; Hideki Imai
Broadcast and Tracing
Randomness Re-use in Multi-recipient Encryption Schemes / Mihir Bellare ; Jessica Staddon
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / Nelly Fazio
Digital Signatures
The Cramer-Shoup Strong-RSA Signature Scheme Revisited / Marc Fischlin
Strong Key-Insulated Signature Schemes / Jonathan Katz ; Shouhuai Xu ; Moti Yung
Specialized Multiparty Cryptography
A Verifiable Secret Shuffle of Homomorphic Encryptions / Jens Groth
Round-Optimal Contributory Conference Key Agreement / Colin Boyd ; Juan Manuel González Nieto
Cryptanalysis I
Security Analysis of the MORCryptosystem / Christian Tobias
A Practical Attack on Some Braid Group Based Cryptographic Primitives / Dennis Hofheinz ; Rainer Steinwandt
Elliptic Curves: Implementation Attacks
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems / Louis Goubin
Validation of Elliptic Curve Public Keys / Adrian Antipa ; Daniel Brown ; Alfred Menezes ; René Struik ; Scott Vanstone
Exceptional Procedure Attack on Elliptic Curve Cryptosystems / Tetsuya Izu ; Tsuyoshi Takagi
Implementation and Hardware Issues
A Dedicated Sieving Hardware / Martijn Stam ; Willi Geiselmann
A Fast and Secure Implementation of Sflash / Mehdi-Laurent Akkar ; Nicolas T. Courtois ; Romain Duteuil
New Public Key Schemes
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes / David Galindo ; Sebastià Martín ; Paz Morillo ; Jorge L. Villar
A Lattice Based Public Key Cryptosystem Using Polynomial Representations / Seong-Hun Paeng ; Bae Eun Jung ; Kil-Chan Ha
Elliptic Curves: General Issues
The Security of DSA and ECDSA (Bypassing the Standard Elliptic Curve Certification Scheme) / Serge Vaudenay
Cryptanalysis II
Side-Channel Attacks on Textbook RSA and ElGamal Encryption / Ulrich Kuhn
On the Security of HFE, HFEv- and Quartz / Magnus Daum ; Patrick Felke
Generic Attacks and the Security of Quartz
Author Index
Diffie-Hellman Based Schemes
Efficient Construction of (Distributed) Verifiable Random Functions / Yevgeniy Dodis
An Identity-Based Signature from Gap Diffie-Hellman Groups / Jae Choon Cha ; Jung Hee Cheon
10.

図書

図書
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York : Association for Computing Machinery, c2008  100 p. ; 28 cm
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼