Loading…

Security and privacy in the age of ubiquitous computing IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Full description

Saved in:
Bibliographic Details
Corporate Authors: IFIP TC11 International Information Security Conference Chiba, Japan, SpringerLink (Online service)
Other Authors: Sasaki, Ryoichi
Format: Conference Proceeding eBook
Language:English
Published: New York : Springer, 2005.
New York : 2005.
Series:International Federation for Information Processing (Series) ; 181.
Physical Description:
1 online resource (xvi, 612 pages) : illustrations.
Subjects:
Online Access:SpringerLink - Click here for access

MARC

LEADER 00000cam a22000004a 4500
001 ocm76836440
003 OCoLC
005 20240223121953.0
006 m o d
007 cr |n|||||||||
008 050324s2005 nyua ob 101 0 eng c
010 |a 2005046558 
015 |a GBA557823  |2 bnb 
019 |a 148737377  |a 186578371  |a 213351617  |a 228379137  |a 262677638  |a 320976014  |a 606035337  |a 647529886  |a 690014427  |a 698450391  |a 880023684  |a 985033283  |a 1005765801  |a 1035707361  |a 1044246213  |a 1044303110  |a 1044330974  |a 1050955871  |a 1056298934  |a 1056366164  |a 1056410535  |a 1060698003  |a 1060792130  |a 1075526252  |a 1077879158  |a 1077969304  |a 1086882220  |a 1097270537  |a 1102278492  |a 1136171139  |a 1162644486  |a 1229241982  |a 1406308684  |a 1418775732 
020 |a 038725658X  |q (alk. paper) 
020 |a 9780387256580  |q (alk. paper) 
020 |a 0387256601  |q (electronic bk.) 
020 |a 9780387256603  |q (electronic bk.) 
020 |a 6610609233 
020 |a 9786610609239 
035 |a (OCoLC)76836440  |z (OCoLC)148737377  |z (OCoLC)186578371  |z (OCoLC)213351617  |z (OCoLC)228379137  |z (OCoLC)262677638  |z (OCoLC)320976014  |z (OCoLC)606035337  |z (OCoLC)647529886  |z (OCoLC)690014427  |z (OCoLC)698450391  |z (OCoLC)880023684  |z (OCoLC)985033283  |z (OCoLC)1005765801  |z (OCoLC)1035707361  |z (OCoLC)1044246213  |z (OCoLC)1044303110  |z (OCoLC)1044330974  |z (OCoLC)1050955871  |z (OCoLC)1056298934  |z (OCoLC)1056366164  |z (OCoLC)1056410535  |z (OCoLC)1060698003  |z (OCoLC)1060792130  |z (OCoLC)1075526252  |z (OCoLC)1077879158  |z (OCoLC)1077969304  |z (OCoLC)1086882220  |z (OCoLC)1097270537  |z (OCoLC)1102278492  |z (OCoLC)1136171139  |z (OCoLC)1162644486  |z (OCoLC)1229241982  |z (OCoLC)1406308684  |z (OCoLC)1418775732 
037 |a 978-0-387-25658-0  |b Springer  |n http://www.springerlink.com 
040 |a COO  |b eng  |e pn  |c COO  |d N$T  |d YDXCP  |d UAB  |d GW5XE  |d CNTRU  |d OCLCQ  |d B24X7  |d OCLCQ  |d NTG  |d E7B  |d U5D  |d IDEBK  |d YNG  |d OCLCQ  |d NLGGC  |d OCLCO  |d OCLCF  |d OCLCO  |d BEDGE  |d OCLCO  |d OCLCQ  |d OCLCO  |d NUI  |d SLY  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d VT2  |d Z5A  |d LIV  |d OCLCQ  |d ESU  |d OCLCA  |d BUF  |d STF  |d OCLCQ  |d CEF  |d U3W  |d OCLCQ  |d COO  |d WYU  |d YOU  |d AUD  |d OCLCQ  |d SFB  |d BRF  |d EBLCP  |d LVT  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d WSU 
042 |a pcc 
049 |a COM6 
050 4 |a QA76.9.A25  |b T38 2005 
072 7 |a TK  |2 lcco 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
084 |a TP309-532  |2 clc 
111 2 |a IFIP TC11 International Information Security Conference  |0 https://id.loc.gov/authorities/names/n2005077681  |n (20th :  |d 2005 :  |c Chiba, Japan) 
245 1 0 |a Security and privacy in the age of ubiquitous computing :  |b IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan /  |c edited by Ryoichi Sasaki [and others]. 
260 |a New York :  |b Springer,  |c 2005. 
264 1 |a New York :  |b Springer,  |c 2005. 
300 |a 1 online resource (xvi, 612 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a International Federation for Information Processing ;  |v 181. 
504 |a Includes bibliographical references. 
505 0 |a Regular Papers -- Accountable Anonymous E-Mail -- Protecting Consumer Data in Composite Web Services -- A Decision Matrix Approach -- Assignment of Security Clearances in an Organization -- Tool Supported Management of Information Security Culture -- ERPSEC -- A Reference Framework to Enhance Security in ERP Systems -- A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises -- A Secure Quantum Communication Protocol Using Insecure Public Channels -- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems -- Design and Implementation of TPM SUP320 -- Mathematical Models of IP Traceback Methods and Their Verification -- Transferable E-Cash Revisit -- A License Transfer System for Supporting Content Portability in Digital Rights Management -- Secure Human Communications Based on Biometrics Signals -- Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks -- An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN -- The Pairing Problem with User Interaction -- Network Smart Card -- Protection Against Spam Using Pre-Challenges -- Automatically Hardening Web Applications Using Precise Tainting -- Traffic Redirection Attack Protection System (TRAPS) -- Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks -- Design, Implementation, and Evaluation of Fritrace -- Design and Implementation of a High-Performance Network Intrusion Prevention System -- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis -- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection -- Designated-Verifier Proxy Signature Schemes -- Tripartite Concurrent Signatures -- Signcryption in Hierarchical Identity Based Cryptosystem -- Protecting Group Dynamic Information in Large Scale Multicast Groups -- Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks -- Ensuring Media Integrity on Third-Party Infrastructures -- A New Fragile Mesh Watermarking Algorithm for Authentication -- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images -- Workshop Papers -- Overcoming Channel Bandwidth Constraints in Secure SIM Applications -- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation -- On-the-Fly Formal Testing of a Smart Card Applet -- A Computationally Feasible SPA Attack on AES VIA Optimized Search -- The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations -- Streamto: Streaming Content Using a Tamper-Resistant Token. 
520 |a International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit springeronline.com. For more information about IFIP, please visit www.ifip.or.at. 
506 |a Available to OhioLINK libraries. 
650 0 |a Computer security  |v Congresses.  |0 https://id.loc.gov/authorities/subjects/sh2008101458. 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 https://id.loc.gov/authorities/subjects/sh2008101490. 
650 0 |a Ubiquitous computing  |v Congresses.  |0 https://id.loc.gov/authorities/subjects/sh2008113063. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Congrès. 
650 6 |a Informatique omniprésente  |v Congrès. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh. 
650 0 7 |a Computer networks  |x Security measures.  |2 cct. 
650 0 7 |a Ubiquitous computing.  |2 cct. 
650 0 7 |a Computer security.  |2 cct. 
650 7 |a Informatique.  |2 eclas. 
650 7 |a Computer networks  |x Security measures.  |2 fast. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Ubiquitous computing.  |2 fast. 
650 1 7 |a Computerbeveiliging.  |2 gtt. 
650 1 7 |a Databescherming.  |2 gtt. 
650 1 7 |a Privacy.  |2 gtt. 
655 2 |a Congress.  |0 https://id.nlm.nih.gov/mesh/D016423. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft  |0 https://id.loc.gov/authorities/genreForms/gf2014026068. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Sasaki, Ryoichi.  |0 https://id.loc.gov/authorities/names/n2005022347. 
710 2 |a SpringerLink (Online service)  |0 https://id.loc.gov/authorities/names/no2005046756. 
773 0 |t OhioLINK electronic book center  |w (OCoLC)180989150. 
773 0 |t SpringerLink  |w (OCoLC)43927870. 
776 0 8 |i Print version:  |a IFIP TC11 International Information Security Conference (20th : 2005 : Chiba, Japan).  |t Security and privacy in the age of ubiquitous computing.  |d New York : Springer, 2005  |z 038725658X  |w (DLC) 2005046558  |w (OCoLC)58729191. 
830 0 |a International Federation for Information Processing (Series) ;  |0 https://id.loc.gov/authorities/names/n98081386  |v 181. 
907 |a .b35558453  |b multi  |c -  |d 120614  |e 240320 
998 |a (3)cue  |a cc  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g nyu  |h 0  |i 3 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug, 5 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150149682  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/b135818  |3 SpringerLink  |z Click here for access