Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 460 pages, weight: 714 g, 75 Illustrations, black and white; XIII, 460 p. 75 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 6151
  • Izdošanas datums: 16-Nov-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642163416
  • ISBN-13: 9783642163418
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 460 pages, weight: 714 g, 75 Illustrations, black and white; XIII, 460 p. 75 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 6151
  • Izdošanas datums: 16-Nov-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642163416
  • ISBN-13: 9783642163418
Citas grāmatas par šo tēmu:
The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of cryptog- phy and information security taking place in China. The scienti c program of the conference covered all areas of current research in the ?eld, with sessions on central areas of cryptographic research and on many important areas of - formation security. The conference continues to get the support of the entire international community, re ecting on the fact that the research areas covered byInscryptareimportantto moderncomputing,whereincreasedsecurity,trust, safety and reliability are required. The international Program Committee of Inscrypt 2009 received a total of 147 submissions from more than 20 countries and regions, from which only 32 submissions were selected for presentation, 22 of which in the regular papers track and 10 submissions in the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, te- nical remarks and strict selection criteria the papers were chosen for the various tracks. The selection to both tracks was a highly competitive process.
Cryptanalysis
Integral Cryptanalysis of ARIA
1(14)
Ping Li
Bing Sun
Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions
15(20)
Nicky Mouha
Gautham Sekar
Jean-Philippe Aumasson
Thomas Peyrin
Soren S. Thomsen
Meltem Sonmez Turan
Bart Preneel
Differential-Multiple Linear Cryptanalysis
35(15)
Zhiqiang Liu
Dawu Gu
Jing Zhang
Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher
50(10)
Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility
60(15)
Wei Zhao
Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
75(18)
S. Sharmila Deva Selvi
S. Sree Vivek
C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model
93(15)
Shivank Agrawal
Swarun Kumar
Amjed Shareef
C. Pandu Rangan
Breaking and Building of Threshold Signcryption Schemes
108(16)
S. Sharmila Deva Selvi
S. Sree Vivek
Shilpi Nayak
C. Pandu Rangan
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption
124(10)
Fengjiao Wang
Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network
134(10)
Zhigang Gao
Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework
144(10)
Xuexian Hu
Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
154(10)
Helger Lipmaa
Bingsheng Zhang
Optionally Identifiable Private Handshakes
164(15)
Yanjiang Yang
Jian Weng
Jianying Zhou
Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience
179(19)
Arpita Patra
Ashish Choudhury
C. Pandu Rangan
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice
198(17)
Ruming Yin
Jian Yuan
Qiuhua Yang
Xiuming Shan
Xiqin Wang
Proposition of Two Cipher Structures
215(15)
Lei Zhang
Wenling Wu
Liting Zhang
Hardware Framework for the Rabbit Stream Cipher
230(18)
Deian Stefan
Linearity within the SMS4 Block Cipher
248(18)
Muhammad Reza Z'aba
Leonie Simpson
Ed Dawson
Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
266(12)
Jean-Charles Faugere
Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits
278(10)
Xianmeng Meng
Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
288(15)
Takeo Mizuno
Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery
303(10)
Rui Zhang
Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms
313(11)
Xiaofeng Nie
Jiwu Jing
Yuewu Wang
Remodeling Vulnerability Information
324(13)
Feng Cheng
Sebastian Roschke
Robert Schuppenies
Christoph Meinel
Using Strategy Objectives for Network Security Analysis
337(13)
Elie Bursztein
John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources
350(16)
Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags
366(17)
Johann Großschadl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
383(10)
Pedro Peris-Lopez
Julio C. Hernandez-Castro
Juan M.E. Tapiador
Tieyan Li
Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks
393(18)
Mathieu Renauld
Francois-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing
411(15)
Le Kang
Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents
426(17)
Saba Jalal
Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints
443(16)
Sean Policarpio
Yan Zhang
Author Index 459