Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 5487
  • Izdošanas datums: 29-Apr-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642014406
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 5487
  • Izdošanas datums: 29-Apr-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642014406
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. This title presents 28 revised full papers together with 3 invited talks that were reviewed and selected from 183 submissions.

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
Invited Talks.- The State of Hash Functions and the NIST SHA-3
Competition.- Key Evolution Systems in Untrusted Update Environments.- Secure
and Privacy-Preserving Information Brokering.- Digital Signature and
Signcryption Schemes.- Provably Secure Convertible Nominative Signature
Scheme.- Cryptanalysis of Two Ring Signcryption Schemes.- Efficient
Signcryption Key Encapsulation without Random Oracles.- Privacy and
Anonymity.- Strong Anonymous Signatures.- Publicly Verifiable
Privacy-Preserving Group Decryption.- Privacy for Private Key in Signatures.-
Message Authentication Code and Hash Function.- Security of Truncated MACs.-
Security Analysis of Multivariate Polynomials for Hashing.- Secure
Protocols.- SPVT-II: An Efficient Security Protocol Verifier Based on Logic
Programming.- Batch ZK Proof and Verification of OR Logic.- Symmetric
Cryptography.- Constructing Variable-Length PRPs and SPRPs from Fixed-Length
PRPs.- Impossible Differential Analysis of Reduced Round CLEFIA.- Reducible
Polynomial over Constructed by Trinomial ??LFSR.- Certificateless
Cryptography.- Chosen Ciphertext Secure Certificateless Threshold Encryption
in the Standard Model.- Further Observations on Certificateless Public Key
Encryption.- Hardware Implementation and Side Channel Attack.- Efficient
Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.- New
Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers
to Resist SPA.- Wireless Network Security.- A Novel Marking Probability
Distribution Using Probability Propagation in Hierarchical WSN.- Key
Predistribution Schemes Using Codes in Wireless Sensor Networks.- Efficient
Multi-PKG ID-Based Signcryption for Ad Hoc Networks.- Public Key and Identity
Based Cryptography.- On the ComputationalEfficiency of XTR+.- A Variant of
Boneh-Gentry-Hamburgs Pairing-Free Identity Based Encryption Scheme.-
Inter-domain Identity-Based Proxy Re-encryption.- Access Control and Network
Security.- Hardening Botnet by a Rational Botmaster.- Separation of Duty in
Trust-Based Collaboration.- Trusted Computing and Applications.- An Integrity
Assurance Mechanism for Run-Time Programs.- A Security and Performance
Evaluation of Hash-Based RFID Protocols.- Correction, Optimisation and Secure
and Efficient Application of PBD Shuffling.