Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings
Kan Zhang, Yuliang Zheng
Springer, Dec 14, 2004 - Computer security - 442 pages
This book constitutes the refereed proceedings of the 7th International Information Security Conference, ISC 2004, held in Palo Alto, CA, USA, in September 2004. The 36 revised full papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on key management, digital signatures, new algorithms, cryptanalysis, intrusion detection, access control, human authentication, certificate management, mobile and ad-hoc security, Web security, digital rights management, and software security.
What people are saying - Write a review
We haven't found any reviews in the usual places.
StorageEfficient Stateless Group Key Revocation
25 other sections not shown
Other editions - View all
access control adversary agent algorithm Alice anchor point application attack authentication birthmark block broadcast buffer overflow CAPTCHA certificate chameleon hashing ciphertext Computer Science construction corresponding cryptographic database decryption defined denote dictionary attack digital signatures efficient encryption event instances example flow policy attachment graph group key hash chain hash function hash value HAZOP host IEEE images input integer Internet ITDB key derivation function key exchange LNCS MAC address method MMAP mobile node modified network smart card obfuscation output packets parameters password private key problem Proc promiscuous mode proof proposed protocol public key radix-r representation random related-key attacks remote server ring signature rNAF role secret key Section semantics sends signature scheme signcryption signer smart card specific Springer-Verlag step subset technique Theorem transactions update verifier watermark web of trust