Cargando…

Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings /

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Soft...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Lipmaa, Helger (Editor ), Yung, Moti (Editor ), Lin, Donghai (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 4318
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Digital Signature Schemes
  • Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05
  • Identity-Based Key-Insulated Signature with Secure Key-Updates
  • Efficient Intrusion-Resilient Signatures Without Random Oracles
  • Sequences and Stream Ciphers
  • New Constructions of Large Binary Sequences Family with Low Correlation
  • On the Rate of Coincidence of Two Clock-Controlled Combiners
  • Symmetric-Key Cryptography
  • Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining
  • OPMAC: One-Key Poly1305 MAC
  • A General Construction of Tweakable Block Ciphers and Different Modes of Operations
  • Cryptographic Schemes
  • Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
  • Efficient Short Signcryption Scheme with Public Verifiability
  • A Revocation Scheme Preserving Privacy
  • Network Security
  • Deterministic Packet Marking with Link Signatures for IP Traceback
  • Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
  • A Network Security Policy Model and Its Realization Mechanism
  • Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic
  • Access Control
  • A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
  • Design and Implementation of Fast Access Control That Supports the Separation of Duty
  • Computer and Applications Security
  • A Practical Alternative to Domain and Type Enforcement Integrity Formal Models
  • Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
  • Application and Evaluation of Bayesian Filter for Chinese Spam
  • Web and Media Security
  • Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
  • An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
  • Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.