rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540308553

Information Security and Cryptology : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings

by ; ;
  • ISBN13:

    9783540308553

  • ISBN10:

    3540308555

  • Format: Paperback
  • Copyright: 2006-02-15
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $119.00 Save up to $99.20
  • Digital
    $42.90
    Add to Cart

    DURATION
    PRICE

Summary

This book constitutes the refereed proceedings of the First SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, CISC 2005, held in Beijing, China in December 2005.The 33 revised full papers and 32 short papers presented together with 2 invited papers were carefully reviewed and selected from 196 submissions. The papers are organized in topical sections on identity based cryptography, security modelling, systems security, signature schemes, symmetric key mechanisms, zero-knowledge and secure computations, threshold cryptography, intrusion detection systems, protocol cryptanalysis, ECC algorithms, applications, secret sharing, and denial of service attacks.

Table of Contents

On bluetooth repairing : key agreement based on symmetric-key cryptographyp. 1
You can prove so many things in zero-knowledgep. 10
Improvements on security proofs of some identity based encryption schemesp. 28
An ID-based verifiable encrypted signature scheme based on Hess's schemep. 42
ID-based signature scheme without trusted PKGp. 53
Specifying authentication using signal events in CSPp. 63
Modeling RFID securityp. 75
Enforcing email addresses privacy using tokensp. 91
Efficient authentication of electronic document workflowp. 101
Practical strong designated verifier signature schemes based on double discrete logarithmsp. 113
Efficient group signatures from bilinear pairingp. 128
Enhanced aggregate signatures from pairingsp. 140
Constructing secure proxy cryptosystemp. 150
Towards a general RC4-like keystream generatorp. 162
HCTR : a variable-input-length enciphering modep. 175
The kth-order quasi-generalized bent functions over ring Z[subscript p]p. 189
A fast algorithm for determining the linear complexity of periodic sequencesp. 202
An unbounded simulation-sound non-interactive zero-knowledge proof system for NPp. 210
An improved secure two-party computation protocolp. 221
Security analysis of some threshold signature schemes and multi-signature schemesp. 233
ID-based threshold unsigncryption scheme from pairingsp. 242
Improvement of detection ability according to optimum selection of measures based on statistical approachp. 254
The conflict detection between permission assignment constraints in role-based access controlp. 265
Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selectionp. 279
Security analysis of three cryptographic schemes from other cryptographic schemesp. 290
An effective attack on the quantum key distribution protocol based on quantum encryptionp. 302
A remark on implementing the well pairingp. 313
Efficient simultaneous inversion in parallel and application to point multiplication in ECCp. 324
Key management for secure overlay multicastp. 336
Design and implementation of IEEE 802.11i architecture for next generation WLANp. 346
Automatic alignment of fingerprint features for fuzzy fingerprint vaultp. 358
Classification of universally ideal homomorphic secret sharing schemes and ideal black-box secret sharing schemesp. 370
New methods to construct cheating immune multisecret sharing schemep. 384
Detection of unknown DoS attacks by Kolmogorov-complexity fluctuationp. 395
MIPv6 binding update protocol secure against both redirect and DoS attacksp. 407
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program