rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540496083

Information Security and Cryptology : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006: Proceedings

by ; ;
  • ISBN13:

    9783540496083

  • ISBN10:

    3540496084

  • Format: Paperback
  • Copyright: 2007-01-03
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $79.20
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book constitutes the refereed proceedings of the Second SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2006 (formerly CISC), held in Beijing, China in November/December 2006. The 23 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in topical sections on digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.

Table of Contents

Cryptanalysis of two signature schemes based on bilinear pairings in CISC '05p. 1
Identity-based key-insulated signature with secure key-updatesp. 13
Efficient intrusion-resilient signatures without random oraclesp. 27
New constructions of large binary sequences family with low correlationp. 42
On the rate of coincidence of two clock-controlled combinersp. 54
Designing power analysis resistant and high performance block cipher coprocessor using WDDL and wave-pipeliningp. 66
OPMAC : one-key Poly1305 MACp. 78
A general construction of tweakable block ciphers and different modes of operationsp. 88
Dynamic threshold and cheater resistance for shamir secret sharing schemep. 103
Efficient short signcryption scheme with public verifiabilityp. 118
A revocation scheme preserving privacyp. 130
Deterministic packet marking with link signatures for IP tracebackp. 144
Survey and taxonomy of feature selection algorithms in intrusion detection systemp. 153
A network security policy model and its realization mechanismp. 168
Packet marking based cooperative attack response service for effectively handling suspicious trafficp. 182
A verifiable formal specification for RBAC model with constraints of separation of dutyp. 196
Design and implementation of fast access control that supports the separation of dutyp. 211
A practical alternative to domain and type enforcement integrity formal modelsp. 225
Return address randomization scheme for annuling data-injection buffer overflow attacksp. 238
Application and evaluation of Bayesian filter for Chinese spamp. 253
Batch decryption of encrypted short messages and its application on concurrent SSL handshakesp. 264
An enterprise security management, system as a Web-based application service for small/medium businessesp. 279
Obtaining asymptotic fingerprint codes through a new analysis of the Boneh-Shaw codesp. 289
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program