The Locator -- [(title = "Remotely ")]

134 records matched your query       


Record 28 | Previous Record | Long Display | Next Record
06043cam a2200397Ia 4500
001 876141240F3F11DF93771FC5C41A358D
003 SILO
005 20100201083435
006 m        d        
007 cr mnu
008 081017s2005    gw a    sb    101 0 eng d
020    $a 3540320997
020    $a 9783540320999
035    $a (OCoLC)262681468
040    $a GW5XE $b eng $c GW5XE $d SILO $d UMC $d IWA $d SILO
082 04 $a 005.8 $2 22
111 2  $a International Conference on Information and Communications Security $n (7th : $d 2005 : $c Beijing, China)
245 1  $a Information and communications security $h [electronic resource] : $b 7th international conference, ICICS 2005, Beijing, China, December 10-13, 2005 : proceedings / $c Sihan Qing ... [et al.] (eds.).
246 30 $a ICICS 2005
260    $a New York : $b Springer, $c c2005.
300    $a 1 online resource (xiv, 492 p.) : $b ill.
490 1  $a Lecture notes in computer science, $x 0302-9743 ; $v 3783
500    $a Description based on print.
504    $a Includes bibliographical references and index.
505 00 $t DDIPS: an intrusion prevention system for database security / $t An evenhanded certified email system for contract signing / $r Jiazhu Dai, Huaikou Miao. $t Efficient ID-based optimistic fair exchange with provable security / $r Zhenfeng Zhang ... [et al.] -- $t On the quest for impartiality: design and analysis of a fair non-repudiation protocol / $r J. Cederquist ... [et al.] -- $t Generic, optimistic, and efficient schemes for fair certified email delivery / $r Guilin Wang ... [et al.] -- $t DIGITAL SIGNATURES I -- $t Cryptanalysis of a forward secure blind signature scheme with provable security / $r Shuhong Wang ... [et al.] -- $t On delegatability of four designated verifier signatures / $r Yong Li ... [et al.] -- $t PIATS: a partially sanitizable signature scheme / $r Tetsuya Izu ... [et al.] -- $t CRYPTOGRAPHIC PROTOCOLS -- $t Ciphertext comparison, a new solution to the millionaire problem / $r Kun Peng ... [et al.] -- $t Private itemset support counting / $r Sven Laur ... [et al.] -- $t Visual cryptographic protocols using the trusted initializer / $r Hidenori Kuwakado ... [et al.] -- $t Admissible interference by typing for cryptographic protocols / $r Alaaeddine Fellah, John Mullins -- $t CRYPTANALYSIS -- $t On the security bounds of CMC, EME, EME+ and EME* modes of operation / $r Raphael C.-W. Phan, Bok-Min Goi -- $t On the security of encryption modes of MD4, MD5 and HAVAL / $r Jongsung Kim ... [et al.] -- $t Cryptanalysis of PASS II and MiniPass / $r Bok-Min Goi ... [et al.] -- $t Simple power analysis on fast modular reduction with NIST recommended elliptic curves / $r Yasuyuki Sakai, Kouichi Sakurai -- $t DIGITAL SIGNATURES II -- $t Asymmetric concurrent signatures / $r Khanh Nguyen -- $t Generic construction of (identity-based) perfect concurrent signatures / $r Sherman S.M. Chow, Willy Susilo -- $t Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains / $r Huafei Zhu ... [et al.] -- $t NETWORK SECURITY -- $t Session table architecture for defending SYN flood attack / $r Xin Li ... [et al.] -- $t A behavior-based ingress rate-limiting mechanism against DoS/DDoS attacks / $r Song Huang ... [et al.] -- $t Port scan behavior diagnosis by clustering / $r Lanjia Wang ... [et al.] -- $t Network vulnerability analysis through vulnerability take-grant model (VTG) / $r Hamid Reza Shahriari ... [et al.] -- $t APPLIED CRYPTOGRAPHY -- $t Multiplex encryption: a practical approach to encrypting multi-recipient emails / $r Wei Wei ... [et al.] -- $t Secure multicast using proxy encryption / $r Yun-Peng Chiu ... [et al.] -- $t KEY MANAGEMENT -- $t Security properties of two authenticated conference key agreement protocols / $r Qiang Tang, Chris J. Mitchell -- $t Cryptanalysis of two user identification schemes with key distribution preserving anonymity / $r Eun-Jun Yoon, Kee-Young Yoo -- $t Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment / $r Sangjin Kim ... [et al.] -- $t ACCESS CONTROL -- $t Enforce mandatory access control policy on XML documents / $r Lan Li ... [et al.] -- $t Network access control for mobile ad-hoc networks / $r Pan Wang ... [et al.] -- $t Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware / $r Debra L. Cook ... [et al.] -- $t APPLICATIONS -- $t Authenticating query results in data publishing / $r Di Ma ... [et al.] -- $t Multi-source stream authentication framework in case of composite MPEG-4 stream / $r Tieyan Li ... [et al.] -- $t Batching SSL/TLS handshake improved / $r Fang Qi ... [et al.] -- $t Achieving efficient conjunctive keyword searches over encrypted data / $r Lucas Ballard ... [et al.] -- $t WATERMARKING -- $t Total disclosure of the embedding and detection algorithms for a secure digital watermarking scheme for audio / $r David Megías ... [et al.] -- $t Reversible watermark with large capacity using the predictive coding / $r Minoru Kuribayashi ... [et al.] -- $t SYSTEM SECURITY -- $t PCAV: Internet attack visualization on parallel coordinates / $r Hyunsang Choi, Heejo Lee -- $t Implementation of packet filter configurations anomaly detection system with SIERRA / $r Yi Yin ... [et al.] -- $t DDIPS: an intrusion prevention system for database security / $r Jiazhu Dai, Huaikou Miao.
650  0 $a Computer security $v Congresses.
650  0 $a Telecommunication systems $x Security measures $v Congresses.
700 1  $a Qing, Sihan.
776 08 $i Print version: $a International Conference on Information and Communications Security (7th : 2005 : Beijing, China). $t Information and communications security. $d Berlin ; New York : Springer, c2005 $z 3540309349 $w (OCoLC)62742974 $w (OCoLC)62742974
830  0 $a Lecture notes in computer science ; $v 3783
856 40 $u http://dx.doi.org/10.1007/11602897
856 40 $u http://proxy.lib.iastate.edu:2048/login?url=http://www.springerlink.com/openurl.asp?genre=book&isbn=3-540-30934-9
941    $a 1
952    $l USUX851 $d 20160825043810.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=876141240F3F11DF93771FC5C41A358D
994    $a 02 $b IWA

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.