On bluetooth repairing : key agreement based on symmetric-key cryptography | p. 1 |
You can prove so many things in zero-knowledge | p. 10 |
Improvements on security proofs of some identity based encryption schemes | p. 28 |
An ID-based verifiable encrypted signature scheme based on Hess's scheme | p. 42 |
ID-based signature scheme without trusted PKG | p. 53 |
Specifying authentication using signal events in CSP | p. 63 |
Modeling RFID security | p. 75 |
Enforcing email addresses privacy using tokens | p. 91 |
Efficient authentication of electronic document workflow | p. 101 |
Practical strong designated verifier signature schemes based on double discrete logarithms | p. 113 |
Efficient group signatures from bilinear pairing | p. 128 |
Enhanced aggregate signatures from pairings | p. 140 |
Constructing secure proxy cryptosystem | p. 150 |
Towards a general RC4-like keystream generator | p. 162 |
HCTR : a variable-input-length enciphering mode | p. 175 |
The kth-order quasi-generalized bent functions over ring Z[subscript p] | p. 189 |
A fast algorithm for determining the linear complexity of periodic sequences | p. 202 |
An unbounded simulation-sound non-interactive zero-knowledge proof system for NP | p. 210 |
An improved secure two-party computation protocol | p. 221 |
Security analysis of some threshold signature schemes and multi-signature schemes | p. 233 |
ID-based threshold unsigncryption scheme from pairings | p. 242 |
Improvement of detection ability according to optimum selection of measures based on statistical approach | p. 254 |
The conflict detection between permission assignment constraints in role-based access control | p. 265 |
Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection | p. 279 |
Security analysis of three cryptographic schemes from other cryptographic schemes | p. 290 |
An effective attack on the quantum key distribution protocol based on quantum encryption | p. 302 |
A remark on implementing the well pairing | p. 313 |
Efficient simultaneous inversion in parallel and application to point multiplication in ECC | p. 324 |
Key management for secure overlay multicast | p. 336 |
Design and implementation of IEEE 802.11i architecture for next generation WLAN | p. 346 |
Automatic alignment of fingerprint features for fuzzy fingerprint vault | p. 358 |
Classification of universally ideal homomorphic secret sharing schemes and ideal black-box secret sharing schemes | p. 370 |
New methods to construct cheating immune multisecret sharing scheme | p. 384 |
Detection of unknown DoS attacks by Kolmogorov-complexity fluctuation | p. 395 |
MIPv6 binding update protocol secure against both redirect and DoS attacks | p. 407 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.