Applied cryptography and network security : (Record no. 3618)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100309s2009 nyu 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2009929955
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642019562 (softcover : alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u4614
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
245 00 - TITLE STATEMENT
Title Applied cryptography and network security :
Remainder of title 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. proceedings /
Statement of responsibility, etc. [edited by] Michel Abdalla, David Pointcheval, Pierre-Alain Fouque.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. 2009.
300 ## - PHYSICAL DESCRIPTION
Extent p. cm.
490 0# - SERIES STATEMENT
Series statement Lecture notes in computer science ;
Volume/sequential designation 5536
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- Add to marked items Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Tracing and Revoking Pirate Rebroadcasts .
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
596 ## -
-- 1
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Communication Networks
9 (RLIN) 9215
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Database management
General subdivision Computer programs.
9 (RLIN) 9216
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Security and Cryptology
9 (RLIN) 9217
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Theoretical computer science and general issues
9 (RLIN) 2787
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ad hoc networks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ciphertext attack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cryptanalysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term internet security
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Abdalla , Michel
9 (RLIN) 9218
920 ## -
-- 3642019560 (softcover : alk. paper)
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / AB.A 2009 006626 11/24/2019 1 11/24/2019 Books