Information security and cryptology second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006 ; proceedings /

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Soft...

Full description

Corporate Authors: Inscrypt (Conference) Beijing, China)
Other Authors: Inscrypt (Conference), Lipmaa, Helger., Yung, Moti., Lin, Dongdai., SpringerLink (Online service)
Format: eBook
Language: English
Published: Berlin ; New York : Springer, ©2006.
Berlin ; New York : [2006]
Physical Description: 1 online resource (xi, 303 pages) : illustrations.
Series: Lecture notes in computer science ; 4318.
Subjects:
LEADER 08469cam a22011414a 4500
001 77083143
003 OCoLC
005 20240223121953.0
006 m o d
007 cr |n|||||||||
008 061017s2006 gw a ob 101 0 eng c
010 |a 2006936729 
016 7 |a 981711030  |2 DE-101 
016 7 |a 013615606  |2 Uk 
019 |a 262693926  |a 606614676  |a 767219143  |a 785781706  |a 880104710  |a 1169971408  |a 1172864200  |a 1406310726  |a 1418766050 
020 |a 9783540496083  |q (pbk.) 
020 |a 3540496084  |q (pbk.) 
020 |a 9783540496106 
020 |a 3540496106 
035 |a (OCoLC)77083143  |z (OCoLC)262693926  |z (OCoLC)606614676  |z (OCoLC)767219143  |z (OCoLC)785781706  |z (OCoLC)880104710  |z (OCoLC)1169971408  |z (OCoLC)1172864200  |z (OCoLC)1406310726  |z (OCoLC)1418766050 
037 |a 978-3-540-49608-3  |b Springer  |n http://www.springerlink.com 
040 |a COO  |b eng  |e pn  |c COO  |d GZM  |d OKU  |d BAKER  |d GW5XE  |d OCLCQ  |d YNG  |d E7B  |d OCLCO  |d OCLCQ  |d OCLCA  |d OCLCF  |d BEDGE  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d SLY  |d YDXCP  |d OCLCO  |d NUI  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d EBLCP  |d OCLCQ  |d ESU  |d OCLCA  |d UAB  |d U3W  |d OCLCA  |d OCLCQ  |d TFW  |d ICG  |d LEAUB  |d OCLCQ  |d OL$  |d OCLCQ  |d AUD  |d OCLCQ  |d UKAHL  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d LUN  |d WSU  |d OCLCL 
042 |a pcc 
049 |a COM6 
050 4 |a QA76.9.A25  |b I5525 2006 
072 7 |a QA  |2 lcco 
082 0 4 |a 005.8/2  |2 22 
084 |a TP309-532  |2 clc 
084 |a 004  |2 sdnb 
084 |a DAT 465f  |2 stub 
084 |a SS 4800  |2 rvk 
111 2 |a Inscrypt (Conference)  |n (2nd :  |d 2006 :  |c Beijing, China) 
245 1 0 |a Information security and cryptology :  |b second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006 ; proceedings /  |c Helger Lipmaa, Moti Yung, Dongdai Lin (eds.). 
246 3 0 |a Inscript 2006. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2006. 
264 1 |a Berlin ;  |a New York :  |b Springer,  |c [2006] 
264 4 |c ©2006. 
300 |a 1 online resource (xi, 303 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 4318. 
504 |a Includes bibliographical references and index. 
520 |a The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The research areas covered by Inscrypt have been gaining increased visibility recently since modern computing and communication infrastructures and app- cations require increased security, trust and safety. Indeed important fundam- tal, experimental and applied work has been done in wide areasof cryptography and information security research in recent years. Accordingly, the program of Inscrypt 2006 covered numerous?elds of research within these areas. The International Program Committee of the conference received a total of 225 submissions, from which only 23 submissions were selected for presentation at the regular papers track and are part of this volume. In addition to this track, the conference also hosted a short paper track of 13 presentations that were carefully selected as well. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were selected to the various tracks. 
505 0 |a Digital Signature Schemes -- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05 -- Identity-Based Key-Insulated Signature with Secure Key-Updates -- Efficient Intrusion-Resilient Signatures Without Random Oracles -- Sequences and Stream Ciphers -- New Constructions of Large Binary Sequences Family with Low Correlation -- On the Rate of Coincidence of Two Clock-Controlled Combiners -- Symmetric-Key Cryptography -- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining -- OPMAC: One-Key Poly1305 MAC -- A General Construction of Tweakable Block Ciphers and Different Modes of Operations -- Cryptographic Schemes -- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme -- Efficient Short Signcryption Scheme with Public Verifiability -- A Revocation Scheme Preserving Privacy -- Network Security -- Deterministic Packet Marking with Link Signatures for IP Traceback -- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System -- A Network Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic -- Access Control -- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty -- Design and Implementation of Fast Access Control That Supports the Separation of Duty -- Computer and Applications Security -- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models -- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks -- Application and Evaluation of Bayesian Filter for Chinese Spam -- Web and Media Security -- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes -- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses -- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. 
506 |a Available to OhioLINK libraries. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Cryptography  |v Congresses. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Cryptographie  |v Congrès. 
650 0 7 |a Cryptography.  |2 cct. 
650 0 7 |a Sécurité informatique.  |2 cct. 
650 0 7 |a Cryptographie.  |2 cct. 
650 0 7 |a Computer security.  |2 cct. 
650 7 |a Informatique.  |2 eclas. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Cryptography.  |2 fast. 
653 1 |a Information security. 
653 1 |a Cryptology. 
653 1 |a SKLOIS. 
655 2 |a Congress. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Lipmaa, Helger. 
700 1 |a Yung, Moti. 
700 1 |a Lin, Dongdai. 
710 2 |a SpringerLink (Online service) 
773 0 |t OhioLINK electronic book center  |w (OCoLC)180989150. 
773 0 |t SpringerLink  |w (OCoLC)43927870. 
776 0 8 |i Print version:  |a Inscrypt 2006 (2006 : Beijing, China).  |t Information security and cryptology.  |d Berlin ; New York : Springer, ©2006  |w (DLC) 2006936729  |w (OCoLC)76686135. 
830 0 |a Lecture notes in computer science ;  |v 4318.  |x 0302-9743. 
907 |a .b48363121  |b multi  |c -  |d 150601  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2023.01 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150149979  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/11937807  |3 SpringerLink  |z Click here for access