Lipmaa, Helger (ed.); Yung, Moti (ed.); Lin, Dongdai (ed.) Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. (English) Zbl 1151.94004 Lecture Notes in Computer Science 4318. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). xi, 305 p. (2006). Show indexed articles as search result. The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1099.94001).Indexed articles:Park, Haeryong; Cao, Zhengjun; Liu, Lihua; Lim, Seongan; Yie, Ikkwon; Chun, Kilsoo, Cryptanalysis of two signature schemes based on bilinear pairings in CISC ’05, 1-12 [Zbl 1172.94624]Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue, Identity-based key-insulated signature with secure key-updates, 13-26 [Zbl 1172.94629]Libert, Benoît; Quisquater, Jean-Jacques; Yung, Moti, Efficient intrusion-resilient signatures without random oracles, 27-41 [Zbl 1172.94621]Tong, Xin; Zhang, Jie; Wen, Qiao-Yan, New constructions of large binary sequences family with low correlation, 42-53 [Zbl 1172.94553]Hu, Xuexian; Ming, Yongtao; Liu, Wenfen; Li, Shiqu, On the rate of coincidence of two clock-controlled combiners, 54-65 [Zbl 1172.94551]Tong, Yuanman; Wang, Zhiying; Dai, Kui; Lu, Hongyi, Designing power analysis resistant and high performance block cipher coprocessor using WDDL and wave-pipelining, 66-77 [Zbl 1172.94599]Wang, Dayin; Lin, Dongdai; Wu, Wenling, OPMAC: One-key Poly1305 MAC, 78-87 [Zbl 1172.94600]Chakraborty, Debrup; Sarkar, Palash, A general construction of tweakable block ciphers and different modes of operations, 88-102 [Zbl 1172.94565]Tartary, Christophe; Wang, Huaxiong, Dynamic threshold and cheater resistance for Shamir secret sharing scheme, 103-117 [Zbl 1172.94626]Ma, Changshe, Efficient short signcryption scheme with public verifiability, 118-129 [Zbl 1172.94622]Krzywiecki, Łukasz; Kubiak, Przemysław; Kutyłowski, Mirosław, A revocation scheme preserving privacy, 130-143 [Zbl 1172.94618]Yi, Shi; Xinyu, Yang; Ning, Li; Yong, Qi, Deterministic packet marking with link signatures for IP traceback, 144-152 [Zbl 1172.94631]Chen, You; Li, Yang; Cheng, Xue-Qi; Guo, Li, Survey and taxonomy of feature selection algorithms in intrusion detection system, 153-167 [Zbl 1172.94613]Tang, Chenghua; Yao, Shuping; Cui, Zhongjie; Mao, Limin, A network security policy model and its realization mechanism, 168-181 [Zbl 1172.68351]An, Gaeil; Park, Joon S., Packet marking based cooperative attack response service for effectively handling suspicious traffic, 182-195 [Zbl 1172.68344]Yuan, Chunyang; He, Yeping; He, Jianbo; Zhou, Zhouyi, A verifiable formal specification for RBAC model with constraints of separation of duty, 196-210 [Zbl 1172.68546]Kim, SeongKi; Jin, EunKyung; Song, YoungJin; Han, SangYong, Design and implementation of fast access control that supports the separation of duty, 211-224 [Zbl 1172.68346]Tang, Liuying; Qing, Sihan, A practical alternative to domain and type enforcement integrity formal models, 225-237 [Zbl 1172.68352]Kim, Deok Jin; Kim, Tae Hyung; Kim, Jong; Hong, Sung Je, Return address randomization scheme for annuling data-injection buffer overflow attacks, 238-252 [Zbl 1172.68345]Wu, Yongdong; Bao, Feng, Batch decryption of encrypted short messages and its application on concurrent SSL handshakes, 264-278 [Zbl 1172.94630]Fernandez, Marcel; Cotrina, Josep, Obtaining asymptotic fingerprint codes through a new analysis of the Boneh-Shaw codes, 289-303 [Zbl 1172.94614] Cited in 1 Review MSC: 94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory 94A60 Cryptography 00B25 Proceedings of conferences of miscellaneous specific interest Citations:Zbl 1099.94001 PDFBibTeX XMLCite \textit{H. Lipmaa} (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29--December 1, 2006. Proceedings. Berlin: Springer (2006; Zbl 1151.94004) Full Text: DOI