Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Conference ISC 2012 (2012 : Passau, Germany)
Title Information security : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings / Dieter Gollmann, Felix C. Freiling (eds.).
Imprint Berlin ; New York : Springer, 2012.

LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
Conference ISC 2012 (2012 : Passau, Germany)
Series Lecture notes in computer science, 0302-9743 ; 7483
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7483.
LNCS sublibrary. SL 4, Security and cryptology.
Subject Data encryption (Computer science) -- Congresses.
Data protection -- Congresses.
Computer networks -- Access control -- Congresses.
Computer security -- Congresses.
Alt Name Gollmann, Dieter.
Freiling, Felix C.
Add Title ISC 2012
Description 1 online resource.
polychrome rdacc
Contents Privacy-Preserving Speaker Authentication / Manas Pathak, Jose Portelo, Bhiksha Raj and Isabel Trancoso -- Differential Attacks on Reduced RIPEMD-160 / Florian Mendel, Tomislav Nad, Stefan Scherz and Martin Schlaffer -- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience / Bogdan Groza and Bogdan Warinschi -- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree / Noboru Kunihiro -- Strong Authentication with Mobile Phone / Sanna Suoranta, Andre Andrade and Tuomas Aura -- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? / Chaitrali Amrutkar, Patrick Traynor and Paul C. van Oorschot -- Domain-Specific Pseudonymous Signatures for the German Identity Card / Jens Bender, Ozgur Dagdelen, Marc Fischlin and Dennis Kugler -- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms / Falko Strenzke.
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks / Samiran Bag, Aritra Dhar and Pinaki Sarkar -- Learning Fine-Grained Structured Input for Memory Corruption Detection / Lei Zhao, Debin Gao and Lina Wang -- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation / Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden and Mira Mezini, et al. -- An Empirical Study of Dangerous Behaviors in Firefox Extensions / Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong and Junjie Wang, et al. -- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems / Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes and Hitesh Tewari -- Selective Document Retrieval from Encrypted Database / Christoph Bosch, Qiang Tang, Pieter Hartel and Willem Jonker -- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited / Andreas Peter, Max Kronberg, Wilke Trei and Stefan Katzenbeisser.
Secure Hierarchical Identity-Based Identification without Random Oracles / Atsushi Fujioka, Taiichi Saito and Keita Xagawa -- Efficient Two-Move Blind Signatures in the Common Reference String Model / E. Ghadafi and N.P. Smart -- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems / Jinwei Hu, Khaled M. Khan, Yun Bai and Yan Zhang -- A Quantitative Approach for Inexact Enforcement of Security Policies / Peter Drabik, Fabio Martinelli and Charles Morisset -- OSDM: An Organizational Supervised Delegation Model for RBAC / Nezar Nassr, Nidal Aboudagga and Eric Steegmans -- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library / Johannes Gilger, Johannes Barnickel and Ulrike Meyer -- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching / Ciprian Pungila and Viorel Negru -- Intended Actions: Risk Is Conflicting Incentives / Lisa Rajbhandari and Einar Snekkenes -- On the Self-similarity Nature of the Revocation Data / Carlos Ganan, Jorge Mata-Diaz, Jose L. Munoz, Oscar Esparza and Juanjo Alins.
Note International conference proceedings.
Bibliography Note Includes bibliographical references and author index.
Summary This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
ISBN 9783642333835 (electronic bk.)
3642333834 (electronic bk.)
9783642333828
OCLC # 810275415
Additional Format Printed edition: 9783642333828


If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team