Cryptanalysis of two signature schemes based on bilinear pairings in CISC '05 | p. 1 |
Identity-based key-insulated signature with secure key-updates | p. 13 |
Efficient intrusion-resilient signatures without random oracles | p. 27 |
New constructions of large binary sequences family with low correlation | p. 42 |
On the rate of coincidence of two clock-controlled combiners | p. 54 |
Designing power analysis resistant and high performance block cipher coprocessor using WDDL and wave-pipelining | p. 66 |
OPMAC : one-key Poly1305 MAC | p. 78 |
A general construction of tweakable block ciphers and different modes of operations | p. 88 |
Dynamic threshold and cheater resistance for shamir secret sharing scheme | p. 103 |
Efficient short signcryption scheme with public verifiability | p. 118 |
A revocation scheme preserving privacy | p. 130 |
Deterministic packet marking with link signatures for IP traceback | p. 144 |
Survey and taxonomy of feature selection algorithms in intrusion detection system | p. 153 |
A network security policy model and its realization mechanism | p. 168 |
Packet marking based cooperative attack response service for effectively handling suspicious traffic | p. 182 |
A verifiable formal specification for RBAC model with constraints of separation of duty | p. 196 |
Design and implementation of fast access control that supports the separation of duty | p. 211 |
A practical alternative to domain and type enforcement integrity formal models | p. 225 |
Return address randomization scheme for annuling data-injection buffer overflow attacks | p. 238 |
Application and evaluation of Bayesian filter for Chinese spam | p. 253 |
Batch decryption of encrypted short messages and its application on concurrent SSL handshakes | p. 264 |
An enterprise security management, system as a Web-based application service for small/medium businesses | p. 279 |
Obtaining asymptotic fingerprint codes through a new analysis of the Boneh-Shaw codes | p. 289 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.