{"entities":{"Q1763063":{"pageid":1773805,"ns":120,"title":"Item:Q1763063","lastrevid":74243964,"modified":"2026-04-14T19:08:57Z","type":"item","id":"Q1763063","labels":{"en":{"language":"en","value":"Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27--29, 2004. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 2135264"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1763063$F5931F4D-B652-40F3-953B-84BC9D4499A5","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"c993fbf7021622d62cc7fe23ae13e364162ae6af","datavalue":{"value":{"text":"Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27--29, 2004. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1763063$F3212912-7907-469A-B5D2-43BDD36EAD18","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"88c3af377de3ee3afe4d5cafb886a89f4ef79299","datavalue":{"value":"1056.68020","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763063$9A6B124C-95D4-47E6-8542-0EBB0CCC49A9","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1763063$7E7416DC-CEA9-4327-AAF2-540BCB13616D","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"19c055e4721a86221dc4ad9a18f9249f030fc51e","datavalue":{"value":{"time":"+2005-02-21T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1763063$B9AFFFAD-7EE0-4948-92CB-AC4E215701B6","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"aa26d01bf80f72da2695bdb3f1baf4b652fe8e55","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1028.00038).  Indexed articles:  \\textit{Kwon, Taekyoung}, Practical authenticated key agreement using passwords, 1-12 [Zbl 1109.68468]  \\textit{Zhang, Muxiang}, Further analysis of password authenticated key exchange protocol based on RSA for imbalanced wireless networks, 13-24 [Zbl 1109.68494]  \\textit{Wang, Pan; Ning, Peng; Reeves, Douglas S.}, Storage-efficient stateless group key revocation, 25-38 [Zbl 1109.68491]  \\textit{Backes, Michael; Pfitzmann, Birgit; Waidner, Michael}, Low-level ideal signatures and general integrity idealization, 39-51 [Zbl 1109.68442]  \\textit{Cathalo, Julien; Libert, Beno\u00eet; Quisquater, Jean-Jacques}, Cryptanalysis of a verifiably committed signature scheme based on GPS and RSA, 52-60 [Zbl 1109.68444]  \\textit{Backes, Michael; Hofheinz, Dennis}, How to break and repair a universally composable signature functionality, 61-72 [Zbl 1109.68441]  \\textit{Gentry, Craig; Ramzan, Zulfikar}, RSA accumulator based broadcast encryption, 73-86 [Zbl 1109.68453]  \\textit{Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo}, Chameleon hashing without key exposure, 87-98 [Zbl 1109.68445]  \\textit{Takagi, Tsuyoshi; Yen, Sung-Ming; Wu, Bo-Ching}, Radix-\\(r\\) non-adjacent form., 99-110 [Zbl 1109.94352]  \\textit{Phan, Raphael C.-W.; Handschuh, Helena}, On related-key and collision attacks: The case for the IBM 4758 cryptoprocessor, 111-122 [Zbl 1109.68483]  \\textit{Wang, Guilin; Deng, Robert H.; Kwak, DongJin; Moon, SangJae}, Security analysis of two signcryption schemes, 123-133 [Zbl 1109.68489]  \\textit{Adams, Carlisle; Kramer, Guenther; Mister, Serge; Zuccherato, Robert}, On the security of key derivation functions, 134-145 [Zbl 1109.68440]  \\textit{Wang, Hai; Liu, Peng; Li, Lunqun}, Evaluating the impact of intrusion detection deficiencies on the cost-effectiveness of attack recovery, 146-157 [Zbl 1109.68490]  \\textit{Meier, Michael}, A model for the semantics of attack signatures in misuse detection systems, 158-169 [Zbl 1109.68477]  \\textit{Foster, Mark; Wilson, Joseph N.; Chen, Shigang}, Using greedy Hamiltonian call paths to detect stack smashing attacks, 183-194 [Zbl 1109.68451]  \\textit{Bertino, Elisa; Leggieri, Teodoro; Terzi, Evimaria}, Securing DBMS: Characterizing and detecting query floods, 195-206 [Zbl 1109.68443]  \\textit{Guelev, Dimitar P.; Ryan, Mark; Schobbens, Pierre Yves}, Model-checking access control policies, 219-230 [Zbl 1109.68456]  \\textit{Nali, D.; Adams, C.; Miri, A.}, Using mediated identity-based cryptography to support role-based access control, 245-256 [Zbl 1109.68480]  \\textit{Le, Zhengyi; Ouyang, Yi; Ford, James; Makedon, Fillia}, A hierarchical key-insulated signature scheme in the CA trust model, 280-291 [Zbl 1109.68471]  \\textit{Jiang, Qinglin; Reeves, Douglas S.; Ning, Peng}, Certificate recommendations to improve the robustness of web of trust, 292-303 [Zbl 1109.68464]  \\textit{Xu, Ke; Tate, Stephen R.}, Universally composable secure mobile agent computation, 304-317 [Zbl 1109.68493]  \\textit{Wu, Qianhong; Chen, Xiaofeng; Wang, Changjie; Wang, Yumin}, Shared-key signature and its application to anonymous authentication in ad hoc group, 330-341 [Zbl 1109.68492]  \\textit{Gomu\u0142kiewicz, Marcin; Klonowski, Marek; Kuty\u0142owski, Miros\u0142aw}, Provable unlinkability against traffic analysis already after \\(\\mathcal {O}(\\log (n))\\) steps!, 354-366 [Zbl 1109.68455]  \\textit{Nakanishi, Toru; Shiota, Mitsuaki; Sugiyama, Yuji}, An efficient online electronic cash with unlinkable exact payments, 367-378 [Zbl 1109.68479]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1763063$0D0C25DC-CBEF-4074-933A-513C9C9CD8C4","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763063$49C6DBCF-EAB1-417B-80CE-F08D640E81FB","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763063$71799924-AFCE-4F03-9CCF-EB3F1FF3102A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763063$FBF74DA4-6C08-4FAB-ACF1-72EEF6423FE2","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"19692fbbf680519fa4c8937025e4454dcae9cfb5","datavalue":{"value":"2135264","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763063$8B67655E-64A6-42C9-B586-DB7B889C31A7","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1763063$1BBBE9A8-9B82-4DED-B7AC-32F87C043B18","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"e4806cd4ede6c4adccac9109e2311dbbc5322fb5","datavalue":{"value":"https://doi.org/10.1007/b100936","type":"string"},"datatype":"url"},"type":"statement","id":"Q1763063$433CF48C-8F22-4666-A33C-D085D7F07DCF","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"a729d8a808fd11c854871a59fbe5b05b23f0fb30","datavalue":{"value":"W4247926864","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763063$0A670AD9-8E1E-48B5-8418-2E2E0E263AAC","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"533f640ff344d0e0ddb0b1c97b2db8f1ae780dbd","datavalue":{"value":"10.1007/B100936","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1763063$1E5E33C2-A800-457D-8585-57865BD5F957","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27--29, 2004. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Information_security._7th_international_conference,_ISC_2004,_Palo_Alto,_CA,_USA,_September_27--29,_2004._Proceedings"}}}}}