Update cookies preferences

E-book: Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

Edited by , Edited by , Edited by
  • Format: PDF+DRM
  • Series: Security and Cryptology 5487
  • Pub. Date: 29-Apr-2009
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783642014406
  • Format - PDF+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: PDF+DRM
  • Series: Security and Cryptology 5487
  • Pub. Date: 29-Apr-2009
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783642014406

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. This title presents 28 revised full papers together with 3 invited talks that were reviewed and selected from 183 submissions.

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
Invited Talks.- The State of Hash Functions and the NIST SHA-3
Competition.- Key Evolution Systems in Untrusted Update Environments.- Secure
and Privacy-Preserving Information Brokering.- Digital Signature and
Signcryption Schemes.- Provably Secure Convertible Nominative Signature
Scheme.- Cryptanalysis of Two Ring Signcryption Schemes.- Efficient
Signcryption Key Encapsulation without Random Oracles.- Privacy and
Anonymity.- Strong Anonymous Signatures.- Publicly Verifiable
Privacy-Preserving Group Decryption.- Privacy for Private Key in Signatures.-
Message Authentication Code and Hash Function.- Security of Truncated MACs.-
Security Analysis of Multivariate Polynomials for Hashing.- Secure
Protocols.- SPVT-II: An Efficient Security Protocol Verifier Based on Logic
Programming.- Batch ZK Proof and Verification of OR Logic.- Symmetric
Cryptography.- Constructing Variable-Length PRPs and SPRPs from Fixed-Length
PRPs.- Impossible Differential Analysis of Reduced Round CLEFIA.- Reducible
Polynomial over Constructed by Trinomial ??LFSR.- Certificateless
Cryptography.- Chosen Ciphertext Secure Certificateless Threshold Encryption
in the Standard Model.- Further Observations on Certificateless Public Key
Encryption.- Hardware Implementation and Side Channel Attack.- Efficient
Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.- New
Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers
to Resist SPA.- Wireless Network Security.- A Novel Marking Probability
Distribution Using Probability Propagation in Hierarchical WSN.- Key
Predistribution Schemes Using Codes in Wireless Sensor Networks.- Efficient
Multi-PKG ID-Based Signcryption for Ad Hoc Networks.- Public Key and Identity
Based Cryptography.- On the ComputationalEfficiency of XTR+.- A Variant of
Boneh-Gentry-Hamburgs Pairing-Free Identity Based Encryption Scheme.-
Inter-domain Identity-Based Proxy Re-encryption.- Access Control and Network
Security.- Hardening Botnet by a Rational Botmaster.- Separation of Duty in
Trust-Based Collaboration.- Trusted Computing and Applications.- An Integrity
Assurance Mechanism for Run-Time Programs.- A Security and Performance
Evaluation of Hash-Based RFID Protocols.- Correction, Optimisation and Secure
and Efficient Application of PBD Shuffling.