信息安全及密码术

信息安全及密码术
作 者: Helger Lipmaa
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《信息安全及密码术》作者简介

内容简介

This book constitutes the refereed proceedings of the Second SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2006 (formerly CISC), held in Beijing, China in November/December 2006.The 23 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in topical sections on digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.

图书目录

Digital Signature Schemes

 Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05

 Identity-Based Key-Insulated Signature with Secure Key-Updates

 Efficient Intrusion-Resilient Signatures Without Random Oracles

Sequences and Stream Ciphers

 New Constructions of Large Binary Sequences Family with Low Correlation

 On the Rate of Coincidence of Two Clock-Controlled Combiners

Symmetric-Key Cryptography

 Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining

 OPMAC: One-Key Polyl305 MAC

 A General Construction of Tweakable Block Ciphers and Different Modes of Operations

Cryptographic Schemes

 Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme

 Efficient Short Signcryption Scheme with Public Verifiability

 A Revocation Scheme Preserving Privacy

Network Security

 Deterministic Packet Marking with Link Signatures for IP Traceback

 Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System

 A Network Security Policy Model and Its Realization Mechanism

 Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic

Access Control

 A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty

 Design and Implementation of Fast Access Control That Supports the Separation of Duty

Computer and Applications Security

 A Practical Alternative to Domain and Type Enforcement Integrity Formal Models

 Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks

 Application and Evaluation of Bayesian Filter for Chinese Spam

Web and Midia Security

Author Index