Cargando…

Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Yung, Moti (Editor ), Liu, Peng (Editor ), Lin, Dongdai (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5487
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Talks
  • The State of Hash Functions and the NIST SHA-3 Competition
  • Key Evolution Systems in Untrusted Update Environments
  • Secure and Privacy-Preserving Information Brokering
  • Digital Signature and Signcryption Schemes
  • Provably Secure Convertible Nominative Signature Scheme
  • Cryptanalysis of Two Ring Signcryption Schemes
  • Efficient Signcryption Key Encapsulation without Random Oracles
  • Privacy and Anonymity
  • Strong Anonymous Signatures
  • Publicly Verifiable Privacy-Preserving Group Decryption
  • Privacy for Private Key in Signatures
  • Message Authentication Code and Hash Function
  • Security of Truncated MACs
  • Security Analysis of Multivariate Polynomials for Hashing
  • Secure Protocols
  • SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming
  • Batch ZK Proof and Verification of OR Logic
  • Symmetric Cryptography
  • Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
  • Impossible Differential Analysis of Reduced Round CLEFIA
  • Reducible Polynomial over Constructed by Trinomial ??LFSR
  • Certificateless Cryptography
  • Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
  • Further Observations on Certificateless Public Key Encryption
  • Hardware Implementation and Side Channel Attack
  • Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
  • New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA
  • Wireless Network Security
  • A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN
  • Key Predistribution Schemes Using Codes in Wireless Sensor Networks
  • Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks
  • Public Key and Identity Based Cryptography
  • On the Computational Efficiency of XTR+
  • A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme
  • Inter-domain Identity-Based Proxy Re-encryption
  • Access Control and Network Security
  • Hardening Botnet by a Rational Botmaster
  • Separation of Duty in Trust-Based Collaboration
  • Trusted Computing and Applications
  • An Integrity Assurance Mechanism for Run-Time Programs
  • A Security and Performance Evaluation of Hash-Based RFID Protocols
  • Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.