Muutke küpsiste eelistusi

Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 187 pages, kõrgus x laius: 235x155 mm, kaal: 317 g, 13 Illustrations, color; 16 Illustrations, black and white; XIV, 187 p. 29 illus., 13 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 7011
  • Ilmumisaeg: 23-Sep-2011
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642245854
  • ISBN-13: 9783642245855
  • Pehme köide
  • Hind: 45,00 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 52,94 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 187 pages, kõrgus x laius: 235x155 mm, kaal: 317 g, 13 Illustrations, color; 16 Illustrations, black and white; XIV, 187 p. 29 illus., 13 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 7011
  • Ilmumisaeg: 23-Sep-2011
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642245854
  • ISBN-13: 9783642245855
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives.
Invited Talks
Engineering Trustworthy Systems
1(1)
Sanjay Burman
Secure Implementations for the Internet of Things
2(1)
Jorn-Marc Schmidt
Embedded Security
Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP
3(13)
Kunal Sadalkar
Radhesh Mohandas
Alwyn R. Pais
Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack
16(14)
Santosh Ghosh
Dipanwita Roychowdhury
Embedded Software Security through Key-Based Control Flow Obfuscation
30(15)
Rajat Subhra Chakraborty
Seetharam Narasimhan
Swarup Bhunia
Digital Rights Management
Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform
45(12)
Sambaran Bandyopadhyay
Ruchira Naskar
Rajat Subhra Chakraborty
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture
57(15)
Ratna Dutta
Dheerendra Mishra
Sourav Mukhopadhyay
Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance
72(11)
Ratna Dutta
Cryptographic Protocols
An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
83(10)
Namita Tiwari
Sahadeo Padhye
Distributed Signeryption Schemes with Formal Proof of Security
93(18)
Indivar Gupta
P.K. Saxena
Identity Based Online/Offline Encryption and Signcryption Schemes Revisited
111(17)
S. Sharmila Deva Selvi
S. Sree Vivek
C. Pandu Rangan
Cryptanalysis/Side Channel Attacks
"Rank Correction": A New Side-Channel Approach for Secret Key Recovery
128(16)
Maxime Nassar
Youssef Souissi
Sylvain Guilley
Jean-Luc Danger
A Cache Trace Attack on CAMELLIA
144(13)
Rishabh Poddar
Amit Datta
Chester Rebeiro
An Improvement of Linearization-Based Algebraic Attacks
157(11)
Satrajit Ghosh
Abhijit Das
Cipher Primitives
Generalized Avalanche Test for Stream Cipher Analysis
168(13)
P.R. Mishra
Indivar Gupta
N.R. Pillai
On Applications of Singular Matrices over Finite Fields in Cryptography
181(6)
Dhirendra Singh Yadav
Rajendra K. Sharma
Wagish Shukla
Author Index 187