| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Digital Signature Schemes
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05
Identity-Based Key-Insulated Signature with Secure Key-Updates
Efficient Intrusion-Resilient Signatures Without Random Oracles
Sequences and Stream Ciphers
New Constructions of Large Binary Sequences Family with Low Correlation
On the Rate of Coincidence of Two Clock-Controlled Combiners
Symmetric-Key Cryptography
Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining
OPMAC: One-Key Polyl305 MAC
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Cryptographic Schemes
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
Efficient Short Signcryption Scheme with Public Verifiability
A Revocation Scheme Preserving Privacy
Network Security
Deterministic Packet Marking with Link Signatures for IP Traceback
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
A Network Security Policy Model and Its Realization Mechanism
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic
Access Control
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
Design and Implementation of Fast Access Control That Supports the Separation of Duty
Computer and Applications Security
A Practical Alternative to Domain and Type Enforcement Integrity Formal Models
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
Application and Evaluation of Bayesian Filter for Chinese Spam
Web and Midia Security
Author Index