Information Security and Cryptology
Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
(Sprache: Englisch)
This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences...
Leider schon ausverkauft
versandkostenfrei
Buch
74.89 €
Produktdetails
Produktinformationen zu „Information Security and Cryptology “
Klappentext zu „Information Security and Cryptology “
This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.
Inhaltsverzeichnis zu „Information Security and Cryptology “
- Digital Signature Schemes- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- Sequences and Stream Ciphers
- New Constructions of Large Binary Sequences Family with Low Correlation
- On the Rate of Coincidence of Two Clock-Controlled Combiners
- Symmetric-Key Cryptography
- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining
- OPMAC: One-Key Poly1305 MAC
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Cryptographic Schemes
- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
- Efficient Short Signcryption Scheme with Public Verifiability
- A Revocation Scheme Preserving Privacy
- Network Security
- Deterministic Packet Marking with Link Signatures for IP Traceback
- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
- A Network Security Policy Model and Its Realization Mechanism
- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic
- Access Control
- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
- Design and Implementation of Fast Access Control That Supports the Separation of Duty
- Computer and Applications Security
- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models
- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
- Application and Evaluation of Bayesian Filter for Chinese Spam
- Web and Media Security
- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
-
... mehr
Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes
... weniger
Bibliographische Angaben
- 2006, 308 Seiten, Maße: 15,7 x 23,5 cm, Kartoniert (TB), Englisch
- Herausgegeben:Lipmaa, Helger; Yung, Moti; Lin, Donghai
- Herausgegeben: Helger Lipmaa, Moti Yung, Donghai Lin
- Verlag: Springer
- ISBN-10: 3540496084
- ISBN-13: 9783540496083
- Erscheinungsdatum: 13.11.2006
Sprache:
Englisch
Kommentar zu "Information Security and Cryptology"
0 Gebrauchte Artikel zu „Information Security and Cryptology“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Information Security and Cryptology".
Kommentar verfassen