Information security and cryptology--ICISC 2002 : (Record no. 376789)

MARC details
000 -LEADER
fixed length control field 06364cam a22008054a 4500
001 - CONTROL NUMBER
control field ocn166467517
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20211230132251.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 030212s2003 gw a ob 101 0 eng c
040 ## - CATALOGING SOURCE
Original cataloging agency COO
Language of cataloging eng
Description conventions pn
Transcribing agency COO
Modifying agency QCL
-- OCLCQ
-- YNG
-- OCLCQ
-- OCLCE
-- OCLCQ
-- WAU
-- OCLCO
-- NLGGC
-- OCLCF
-- OCLCQ
-- OCLCO
-- OCL
-- OCLCO
-- OCLCQ
-- DKDLA
-- UKMGB
-- UV0
-- GW5XE
-- UA@
-- YDX
-- OCLCQ
-- ESU
-- OCLCA
-- UAB
-- OCLCQ
-- SHS
-- OCLCA
-- BUF
-- QE2
-- LEAUB
-- OL$
-- OCLCQ
-- UKAHL
-- OCLCO
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 009727819
Source Uk
019 ## -
-- 66705571
-- 436620534
-- 648151421
-- 760073007
-- 769770683
-- 1084936085
-- 1102529715
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540365525
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3540365524
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 3540007164
Qualifying information (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9783540007166
Qualifying information (alk. paper)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/3-540-36552-4
Source of number or code doi
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000044634902
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000051329373
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000051690101
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000058394017
029 1# - (OCLC)
OCLC library identifier NLGGC
System control number 270500030
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 14991554
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 15301345
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)166467517
Canceled/invalid control number (OCoLC)66705571
-- (OCoLC)436620534
-- (OCoLC)648151421
-- (OCoLC)760073007
-- (OCoLC)769770683
-- (OCoLC)1084936085
-- (OCoLC)1102529715
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number I32 2003
055 #3 - CLASSIFICATION NUMBERS ASSIGNED IN CANADA
Classification number QA75
Item number .L38 no.2587
072 #7 - SUBJECT CATEGORY CODE
Subject category code Q
Source lcco
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 54.62
Number source bcl
084 ## - OTHER CLASSIFICATION NUMBER
Classification number PM 585
Number source blsrissc
084 ## - OTHER CLASSIFICATION NUMBER
Classification number PM 580
Number source blsrissc
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
111 2# - MAIN ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element ICISC (Conference)
Number of part/section/meeting (5th :
Date of meeting 2002 :
Location of meeting Seoul, Korea)
9 (RLIN) 21493
245 10 - TITLE STATEMENT
Title Information security and cryptology--ICISC 2002 :
Remainder of title 5th international conference, Seoul, Korea, November 28-29, 2002 : revised papers /
Statement of responsibility, etc. Pil Joong Lee, Chae Hoon Lim, eds.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Berlin ;
-- New York :
Name of publisher, distributor, etc. Springer-Verlag,
Date of publication, distribution, etc. 2003.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xi, 536 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Lecture notes in computer science ;
Volume/sequential designation 2587
490 ## - SERIES STATEMENT
Series statement Serienbezeichnung
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Invited Talk -- Cut- & -Paste Attacks with JAVA -- Digital Signatures -- Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption -- New DSA-Verifiable Signcryption Schemes -- Convertible Group Undeniable Signatures -- An Efficient Fail-Stop Signature Scheme Based on Factorization -- On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme -- Internet Security -- System Specification Based Network Modeling for Survivability Testing Simulation -- A Risk-Sensitive Intrusion Detection Model -- Applet Verification Strategies for RAM-Constrained Devices -- Block/Stream Ciphers -- Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks -- Consistent Differential Patterns of Rijndael -- Hardware Design and Analysis of Block Cipher Components -- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt -- Stream Ciphers & Other Primitives -- On the Efficiency of the Clock Control Guessing Attack -- Balanced Shrinking Generators -- On the Universal Hash Functions in Luby-Rackoff Cipher -- Threshold MACs -- Ideal Threshold Schemes from MDS Codes -- Efficient Implementations -- New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms -- Efficient Computations of the Tate Pairing for the Large MOV Degrees -- Improved Techniques for Fast Exponentiation -- Efficient Hardware Multiplicative Inverters -- Side-Channel Attacks -- Ways to Enhance Differential Power Analysis -- A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion -- A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem -- Hardware Fault Attack on RSA with CRT Revisited -- Cryptographic Protocols I -- Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer -- Non-interactive Auction Scheme with Strong Privacy -- An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control -- Speeding Up Secure Sessions Establishment on the Internet -- Cryptographic Protocols II -- On Fairness in Exchange Protocols -- A Model for Embedding and Authorizing Digital Signatures in Printed Documents -- A Dynamic Group Key Distribution Scheme with Flexible User Join -- Efficient Multicast Key Management for Stateless Receivers -- Biometrics -- Fingerprint Verification System Involving Smart Card -- A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Form subdivision Congresses.
9 (RLIN) 14968
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
Form subdivision Congresses.
9 (RLIN) 14592
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptographie
Form subdivision Congrès.
9 (RLIN) 14593
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Sécurité informatique
Form subdivision Congrès.
9 (RLIN) 17411
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
Authority record control number (OCoLC)fst00872484
9 (RLIN) 2191
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
Source of heading or term fast
Authority record control number (OCoLC)fst00884552
9 (RLIN) 925389
650 17 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Databescherming.
Source of heading or term gtt
9 (RLIN) 16759
650 17 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Geheimschrift.
Source of heading or term gtt
9 (RLIN) 14595
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
9 (RLIN) 396
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings.
Source of term fast
Authority record control number (OCoLC)fst01423772
9 (RLIN) 6065
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lee, Pil Joong.
9 (RLIN) 21495
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lim, Chae Hoon.
9 (RLIN) 21496
776 0# - ADDITIONAL PHYSICAL FORM ENTRY
Main entry heading ICISC 2002 (2002 : Seoul, Korea).
Title Information security and cryptology--ICISC 2002 : 5th international conference, Seoul, Korea, November 28-29, 2002 : revised papers
Record control number (OCoLC)51726773
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture notes in computer science ;
Volume number/sequential designation 2587.
9 (RLIN) 925390
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://link-springer-com.libraryproxy.ist.ac.at/10.1007/3-540-36552-4">https://link-springer-com.libraryproxy.ist.ac.at/10.1007/3-540-36552-4</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH20752827
938 ## -
-- YBP Library Services
-- YANK
-- 13350451
994 ## -
-- 92
-- ATIST
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     EBook e-Library e-Library 26/06/2020   26/06/2020 26/06/2020 eBook

Powered by Koha