Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers 2009 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 439 pages, height x width: 235x155 mm, weight: 694 g, XIII, 439 p., 1 Paperback / softback
  • Sērija : Security and Cryptology 5487
  • Izdošanas datums: 06-Apr-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642014399
  • ISBN-13: 9783642014390
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 439 pages, height x width: 235x155 mm, weight: 694 g, XIII, 439 p., 1 Paperback / softback
  • Sērija : Security and Cryptology 5487
  • Izdošanas datums: 06-Apr-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642014399
  • ISBN-13: 9783642014390
Citas grāmatas par šo tēmu:
Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. This title presents 28 revised full papers together with 3 invited talks that were reviewed and selected from 183 submissions.

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
Invited Talks.- The State of Hash Functions and the NIST SHA-3
Competition.- Key Evolution Systems in Untrusted Update Environments.- Secure
and Privacy-Preserving Information Brokering.- Digital Signature and
Signcryption Schemes.- Provably Secure Convertible Nominative Signature
Scheme.- Cryptanalysis of Two Ring Signcryption Schemes.- Efficient
Signcryption Key Encapsulation without Random Oracles.- Privacy and
Anonymity.- Strong Anonymous Signatures.- Publicly Verifiable
Privacy-Preserving Group Decryption.- Privacy for Private Key in Signatures.-
Message Authentication Code and Hash Function.- Security of Truncated MACs.-
Security Analysis of Multivariate Polynomials for Hashing.- Secure
Protocols.- SPVT-II: An Efficient Security Protocol Verifier Based on Logic
Programming.- Batch ZK Proof and Verification of OR Logic.- Symmetric
Cryptography.- Constructing Variable-Length PRPs and SPRPs from Fixed-Length
PRPs.- Impossible Differential Analysis of Reduced Round CLEFIA.- Reducible
Polynomial over Constructed by Trinomial ??LFSR.- Certificateless
Cryptography.- Chosen Ciphertext Secure Certificateless Threshold Encryption
in the Standard Model.- Further Observations on Certificateless Public Key
Encryption.- Hardware Implementation and Side Channel Attack.- Efficient
Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.- New
Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers
to Resist SPA.- Wireless Network Security.- A Novel Marking Probability
Distribution Using Probability Propagation in Hierarchical WSN.- Key
Predistribution Schemes Using Codes in Wireless Sensor Networks.- Efficient
Multi-PKG ID-Based Signcryption for Ad Hoc Networks.- Public Key and Identity
Based Cryptography.- On the ComputationalEfficiency of XTR+.- A Variant of
Boneh-Gentry-Hamburgs Pairing-Free Identity Based Encryption Scheme.-
Inter-domain Identity-Based Proxy Re-encryption.- Access Control and Network
Security.- Hardening Botnet by a Rational Botmaster.- Separation of Duty in
Trust-Based Collaboration.- Trusted Computing and Applications.- An Integrity
Assurance Mechanism for Run-Time Programs.- A Security and Performance
Evaluation of Hash-Based RFID Protocols.- Correction, Optimisation and Secure
and Efficient Application of PBD Shuffling.