Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings /
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Soft...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
4318 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Digital Signature Schemes
- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- Sequences and Stream Ciphers
- New Constructions of Large Binary Sequences Family with Low Correlation
- On the Rate of Coincidence of Two Clock-Controlled Combiners
- Symmetric-Key Cryptography
- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining
- OPMAC: One-Key Poly1305 MAC
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Cryptographic Schemes
- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
- Efficient Short Signcryption Scheme with Public Verifiability
- A Revocation Scheme Preserving Privacy
- Network Security
- Deterministic Packet Marking with Link Signatures for IP Traceback
- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
- A Network Security Policy Model and Its Realization Mechanism
- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic
- Access Control
- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
- Design and Implementation of Fast Access Control That Supports the Separation of Duty
- Computer and Applications Security
- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models
- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
- Application and Evaluation of Bayesian Filter for Chinese Spam
- Web and Media Security
- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.