MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
100309s2009 nyu 000 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2009929955 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9783642019562 (softcover : alk. paper) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u4614 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| 245 00 - TITLE STATEMENT |
| Title |
Applied cryptography and network security : |
| Remainder of title |
7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. proceedings / |
| Statement of responsibility, etc. |
[edited by] Michel Abdalla, David Pointcheval, Pierre-Alain Fouque. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
1st ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
New York : |
| Name of publisher, distributor, etc. |
Springer, |
| Date of publication, distribution, etc. |
2009. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
p. cm. |
| 490 0# - SERIES STATEMENT |
| Series statement |
Lecture notes in computer science ; |
| Volume/sequential designation |
5536 |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- Add to marked items Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Tracing and Revoking Pirate Rebroadcasts . |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks. |
| 596 ## - |
| -- |
1 |
| 650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Communication Networks |
| 9 (RLIN) |
9215 |
| 650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Database management |
| General subdivision |
Computer programs. |
| 9 (RLIN) |
9216 |
| 650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Security and Cryptology |
| 9 (RLIN) |
9217 |
| 650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Theoretical computer science and general issues |
| 9 (RLIN) |
2787 |
| 653 ## - INDEX TERM--UNCONTROLLED |
| Uncontrolled term |
ad hoc networks |
| 653 ## - INDEX TERM--UNCONTROLLED |
| Uncontrolled term |
ciphertext attack |
| 653 ## - INDEX TERM--UNCONTROLLED |
| Uncontrolled term |
cryptanalysis |
| 653 ## - INDEX TERM--UNCONTROLLED |
| Uncontrolled term |
internet security |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Abdalla , Michel |
| 9 (RLIN) |
9218 |
| 920 ## - |
| -- |
3642019560 (softcover : alk. paper) |