×

Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. (English) Zbl 1151.94004

Lecture Notes in Computer Science 4318. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). xi, 305 p. (2006).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1099.94001).
Indexed articles:
Park, Haeryong; Cao, Zhengjun; Liu, Lihua; Lim, Seongan; Yie, Ikkwon; Chun, Kilsoo, Cryptanalysis of two signature schemes based on bilinear pairings in CISC ’05, 1-12 [Zbl 1172.94624]
Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue, Identity-based key-insulated signature with secure key-updates, 13-26 [Zbl 1172.94629]
Libert, Benoît; Quisquater, Jean-Jacques; Yung, Moti, Efficient intrusion-resilient signatures without random oracles, 27-41 [Zbl 1172.94621]
Tong, Xin; Zhang, Jie; Wen, Qiao-Yan, New constructions of large binary sequences family with low correlation, 42-53 [Zbl 1172.94553]
Hu, Xuexian; Ming, Yongtao; Liu, Wenfen; Li, Shiqu, On the rate of coincidence of two clock-controlled combiners, 54-65 [Zbl 1172.94551]
Tong, Yuanman; Wang, Zhiying; Dai, Kui; Lu, Hongyi, Designing power analysis resistant and high performance block cipher coprocessor using WDDL and wave-pipelining, 66-77 [Zbl 1172.94599]
Wang, Dayin; Lin, Dongdai; Wu, Wenling, OPMAC: One-key Poly1305 MAC, 78-87 [Zbl 1172.94600]
Chakraborty, Debrup; Sarkar, Palash, A general construction of tweakable block ciphers and different modes of operations, 88-102 [Zbl 1172.94565]
Tartary, Christophe; Wang, Huaxiong, Dynamic threshold and cheater resistance for Shamir secret sharing scheme, 103-117 [Zbl 1172.94626]
Ma, Changshe, Efficient short signcryption scheme with public verifiability, 118-129 [Zbl 1172.94622]
Krzywiecki, Łukasz; Kubiak, Przemysław; Kutyłowski, Mirosław, A revocation scheme preserving privacy, 130-143 [Zbl 1172.94618]
Yi, Shi; Xinyu, Yang; Ning, Li; Yong, Qi, Deterministic packet marking with link signatures for IP traceback, 144-152 [Zbl 1172.94631]
Chen, You; Li, Yang; Cheng, Xue-Qi; Guo, Li, Survey and taxonomy of feature selection algorithms in intrusion detection system, 153-167 [Zbl 1172.94613]
Tang, Chenghua; Yao, Shuping; Cui, Zhongjie; Mao, Limin, A network security policy model and its realization mechanism, 168-181 [Zbl 1172.68351]
An, Gaeil; Park, Joon S., Packet marking based cooperative attack response service for effectively handling suspicious traffic, 182-195 [Zbl 1172.68344]
Yuan, Chunyang; He, Yeping; He, Jianbo; Zhou, Zhouyi, A verifiable formal specification for RBAC model with constraints of separation of duty, 196-210 [Zbl 1172.68546]
Kim, SeongKi; Jin, EunKyung; Song, YoungJin; Han, SangYong, Design and implementation of fast access control that supports the separation of duty, 211-224 [Zbl 1172.68346]
Tang, Liuying; Qing, Sihan, A practical alternative to domain and type enforcement integrity formal models, 225-237 [Zbl 1172.68352]
Kim, Deok Jin; Kim, Tae Hyung; Kim, Jong; Hong, Sung Je, Return address randomization scheme for annuling data-injection buffer overflow attacks, 238-252 [Zbl 1172.68345]
Wu, Yongdong; Bao, Feng, Batch decryption of encrypted short messages and its application on concurrent SSL handshakes, 264-278 [Zbl 1172.94630]
Fernandez, Marcel; Cotrina, Josep, Obtaining asymptotic fingerprint codes through a new analysis of the Boneh-Shaw codes, 289-303 [Zbl 1172.94614]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest

Citations:

Zbl 1099.94001
PDFBibTeX XMLCite
Full Text: DOI