Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings /
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Soft...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4318 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Digital Signature Schemes
- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- Sequences and Stream Ciphers
- New Constructions of Large Binary Sequences Family with Low Correlation
- On the Rate of Coincidence of Two Clock-Controlled Combiners
- Symmetric-Key Cryptography
- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining
- OPMAC: One-Key Poly1305 MAC
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Cryptographic Schemes
- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
- Efficient Short Signcryption Scheme with Public Verifiability
- A Revocation Scheme Preserving Privacy
- Network Security
- Deterministic Packet Marking with Link Signatures for IP Traceback
- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
- A Network Security Policy Model and Its Realization Mechanism
- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic
- Access Control
- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
- Design and Implementation of Fast Access Control That Supports the Separation of Duty
- Computer and Applications Security
- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models
- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
- Application and Evaluation of Bayesian Filter for Chinese Spam
- Web and Media Security
- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.