Willkommen, schön sind Sie da!
Logo Ex Libris

Information Security and Cryptology

  • E-Book (pdf)
  • 308 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2... Weiterlesen
E-Books ganz einfach mit der kostenlosen Ex Libris-Reader-App lesen. Hiererhalten Sie Ihren Download-Link.
CHF 93.90
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.
Bestellung & Lieferung in eine Filiale möglich


This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.


Digital Signature Schemes.- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.- Identity-Based Key-Insulated Signature with Secure Key-Updates.- Efficient Intrusion-Resilient Signatures Without Random Oracles.- Sequences and Stream Ciphers.- New Constructions of Large Binary Sequences Family with Low Correlation.- On the Rate of Coincidence of Two Clock-Controlled Combiners.- Symmetric-Key Cryptography.- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining.- OPMAC: One-Key Poly1305 MAC.- A General Construction of Tweakable Block Ciphers and Different Modes of Operations.- Cryptographic Schemes.- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme.- Efficient Short Signcryption Scheme with Public Verifiability.- A Revocation Scheme Preserving Privacy.- Network Security.- Deterministic Packet Marking with Link Signatures for IP Traceback.- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System.- A Network Security Policy Model and Its Realization Mechanism.- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic.- Access Control.- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty.- Design and Implementation of Fast Access Control That Supports the Separation of Duty.- Computer and Applications Security.- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models.- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks.- Application and Evaluation of Bayesian Filter for Chinese Spam.- Web and Media Security.- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes.- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses.- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.


Titel: Information Security and Cryptology
Untertitel: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
EAN: 9783540496106
Digitaler Kopierschutz: Wasserzeichen
Format: E-Book (pdf)
Hersteller: Springer Berlin Heidelberg
Genre: IT & Internet
Anzahl Seiten: 308
Veröffentlichung: 09.11.2006
Dateigrösse: 6.2 MB

Weitere Bände aus der Buchreihe "Security and Cryptology"