Wonder Club world wonders pyramid logo
×

Information Security and Cryptology - ICISC 2003 Book

Information Security and Cryptology - ICISC 2003
Information Security and Cryptology - ICISC 2003, This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.
The 32 revised full papers presented together with an invited, Information Security and Cryptology - ICISC 2003 has a rating of 2.5 stars
   2 Ratings
X
Information Security and Cryptology - ICISC 2003, This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited, Information Security and Cryptology - ICISC 2003
2.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
50 %
2
50 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Information Security and Cryptology - ICISC 2003
  • Written by author Jong In Lim
  • Published by Springer-Verlag New York, LLC, January 2008
  • This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited
  • This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.The 32 revised full papers presented together with an invited
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Binary tree encryption : constructions and applications1
A separable threshold ring signature scheme12
On the security of a group signature scheme with forward security27
An efficient strong designated verifier signature scheme40
Sound computational interpretation of formal encryption with composed keys55
On the security of a new variant of OMAC67
New methods to construct cheating immune functions79
Yet another definition of weak collision resistance and its analysis87
Implementation of Tate pairing on hyperelliptic curves of Genus 297
A general expansion method using efficient endomorphisms112
Design of bit parallel multiplier with lower time complexity127
Architecture for an elliptic curve scalar multiplication resistant on some side-channel attacks139
Efficient scalar multiplication in hyperelliptic curves using a new Frobenius expansion152
Adaptive protocol for entity authentication and key agreement in mobile networks166
Extended role based access control and procedural restrictions184
Layer-based access control model in the manufacturing infrastructure and design automation system197
Secure double auction protocols with full privacy protection215
Sealed-bid auctions with efficient bids230
Providing receipt-freeness in mixnet-based voting protocols245
Receipt-free electronic auction schemes using homomorphic encryption259
Software watermarking through register allocation : implementation, analysis, and attacks274
Analysis of the bounds of linear block codes in watermark channel294
Security analysis of some proxy signatures305
A more secure and efficacious TTS signature scheme320
An efficient revocation algorithm in group signatures339
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity352
Group oriented cryptosystems based on linear access structures370
A new algorith for searching a consistent set of shares in a threshold scheme with cheaters377
Non-interactive deniable ring authentication386
Differential cryptanalysis of TEA and XTEA402
A complete divide and conquer attack on the Alpha1 stream cipher418
New block cipher : ARIA
Truncated differential attacks on 8-round CRYPTON446


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Information Security and Cryptology - ICISC 2003, This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.
The 32 revised full papers presented together with an invited, Information Security and Cryptology - ICISC 2003

X
WonderClub Home

This item is in your Collection

Information Security and Cryptology - ICISC 2003, This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.
The 32 revised full papers presented together with an invited, Information Security and Cryptology - ICISC 2003

Information Security and Cryptology - ICISC 2003

X
WonderClub Home

This Item is in Your Inventory

Information Security and Cryptology - ICISC 2003, This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.
The 32 revised full papers presented together with an invited, Information Security and Cryptology - ICISC 2003

Information Security and Cryptology - ICISC 2003

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: