Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings /

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Soft...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lipmaa, Helger (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης), Lin, Dongdai (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4318
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Digital Signature Schemes
  • Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05
  • Identity-Based Key-Insulated Signature with Secure Key-Updates
  • Efficient Intrusion-Resilient Signatures Without Random Oracles
  • Sequences and Stream Ciphers
  • New Constructions of Large Binary Sequences Family with Low Correlation
  • On the Rate of Coincidence of Two Clock-Controlled Combiners
  • Symmetric-Key Cryptography
  • Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining
  • OPMAC: One-Key Poly1305 MAC
  • A General Construction of Tweakable Block Ciphers and Different Modes of Operations
  • Cryptographic Schemes
  • Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
  • Efficient Short Signcryption Scheme with Public Verifiability
  • A Revocation Scheme Preserving Privacy
  • Network Security
  • Deterministic Packet Marking with Link Signatures for IP Traceback
  • Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
  • A Network Security Policy Model and Its Realization Mechanism
  • Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic
  • Access Control
  • A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
  • Design and Implementation of Fast Access Control That Supports the Separation of Duty
  • Computer and Applications Security
  • A Practical Alternative to Domain and Type Enforcement Integrity Formal Models
  • Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
  • Application and Evaluation of Bayesian Filter for Chinese Spam
  • Web and Media Security
  • Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
  • An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
  • Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.