Wonder Club world wonders pyramid logo
×

Information Security and Cryptology - ICISC 2002 Book

Information Security and Cryptology - ICISC 2002
Information Security and Cryptology - ICISC 2002, This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.
The 35 revised full papers presented together with an invited , Information Security and Cryptology - ICISC 2002 has a rating of 3 stars
   2 Ratings
X
Information Security and Cryptology - ICISC 2002, This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited , Information Security and Cryptology - ICISC 2002
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $107.90
Original Magazine
Physical Format

Sold Out

  • Information Security and Cryptology - ICISC 2002
  • Written by author Pil Joong Lee
  • Published by Springer-Verlag New York, LLC, October 2007
  • This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited
  • This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.The 35 revised full papers presented together with an invited p
Buy Digital  USD$107.90

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Cut-&-Paste Attacks with JAVA1
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption16
New DSA-Verifiable Signcryption Schemes35
Convertible Group Undeniable Signatures48
An Efficient Fail-Stop Signature Scheme Based on Factorization62
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme75
System Specification Based Network Modeling for Survivability Testing Simulation90
A Risk-Sensitive Intrusion Detection Model107
Applet Verification Strategies for RAM-Constrained Devices118
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks138
Consistent Differential Patterns of Rijndael149
Hardware Design and Analysis of Block Cipher Components164
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt182
On the Efficiency of the Clock Control Guessing Attack200
Balanced Shrinking Generators213
On the Universal Hash Functions in Luby-Rackoff Cipher226
Threshold MACs237
Ideal Threshold Schemes from MDS Codes253
New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms264
Efficient Computations of the Tate Pairing for the Large MOV Degrees283
Improved Techniques for Fast Exponentiation298
Efficient Hardware Multiplicative Inverters313
Ways to Enhance Differential Power Analysis327
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion343
A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem359
Hardware Fault Attack on RSA with CRT Revisited374
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer389
Non-interactive Auction Scheme with Strong Privacy407
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control421
Speeding Up Secure Sessions Establishment on the Internet433
On Fairness in Exchange Protocols451
A Model for Embedding and Authorizing Digital Signatures in Printed Documents465
A Dynamic Group Key Distribution Scheme with Flexible User Join478
Efficient Multicast Key Management for Stateless Receivers497
Fingerprint Verification System Involving Smart Card510
A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation525
Author Index535


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Information Security and Cryptology - ICISC 2002, This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.
The 35 revised full papers presented together with an invited , Information Security and Cryptology - ICISC 2002

X
WonderClub Home

This item is in your Collection

Information Security and Cryptology - ICISC 2002, This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.
The 35 revised full papers presented together with an invited , Information Security and Cryptology - ICISC 2002

Information Security and Cryptology - ICISC 2002

X
WonderClub Home

This Item is in Your Inventory

Information Security and Cryptology - ICISC 2002, This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.
The 35 revised full papers presented together with an invited , Information Security and Cryptology - ICISC 2002

Information Security and Cryptology - ICISC 2002

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: