Muutke küpsiste eelistusi

Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers 2008 ed. [Pehme köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 534 pages, kõrgus x laius: 235x155 mm, kaal: 831 g, XII, 534 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 4990
  • Ilmumisaeg: 18-Jul-2008
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540794980
  • ISBN-13: 9783540794981
Teised raamatud teemal:
  • Formaat: Paperback / softback, 534 pages, kõrgus x laius: 235x155 mm, kaal: 831 g, XII, 534 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 4990
  • Ilmumisaeg: 18-Jul-2008
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540794980
  • ISBN-13: 9783540794981
Teised raamatud teemal:
The Third SKLOIS Conference on Information Security and Cryptology (- scrypt2007)wasorganizedbytheStateKeyLaboratoryofInformationSecurity of the Chinese Academy of Sciences in cooperation with Qinhai University for Nationalities. This international conference was held in Xining, Qinhai Province of China, and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. By now, Inscrypt (the International SKLOIS Conference on Information - curity and Cryptology) has become a tradition, and it is, in fact, a leading event in this area, which takes place annually in China. We are pleased with the continuous support by authors, committee members, reviewers, sponsors and organizers. Indeed, the research areas covered by Inscrypt are important, since modern computing (including communication infrastructures and applications) requires increased security, trust, safety and reliability. This need has motivated the research community worldwide to produce important fundamental, exp- imental and applied work in the wide areas of cryptography and information securityresearchin recent years.Accordingly,the programof Inscrypt 2007c- ered numerous ?elds of research within these general areas.
Invited Talks
Cryptanalysis of the SFLASH Signature Scheme (Extended Abstract)
1(4)
Vivien Dubois
Pierre-Alain Fouque
Adi Shamir
Jacques Stern
On the Evolution of User Authentication: Non-bilateral Factors
5(6)
Moti Yung
Digital Signature Schemes
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
11(14)
Raylin Tso
Takeshi Okamoto
Eiji Okamoto
Provably Secure Identity-Based Undeniable Signatures with Selective and Unversal Convertibility
25(15)
Wei Wu
Yi Mu
Willy Susilo
Xinyi Huang
An Efficient ID-Based Proxy Signature Scheme from Pairings
40(11)
Chunxiang Gu
Yuefei Zhu
Block Cipher
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
51(15)
B. Collard
F.-X. Standaert
J.-J. Quisquater
Linear Slide Attacks on the KeeLoq Block Cipher
66(15)
Andrey Bogdanov
Key Management
A Key Predistribution Scheme Based on 3-Designs
81(12)
Junwu Dong
Dingyi Pei
Xueli Wang
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting
93(15)
Weijia Wang
Lei Hu
Yong Li
A Provably Secure One-Pass Two-Party Key Establishment Protocol
108(15)
K. Chalkias
S.T. Halkidis
D. Hristu-Varsakelis
G. Stephanides
A. Alexiadis
Zero Knowledge and Secure Computation Protocols
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption
123(15)
Yi Deng
Dongdai Lin
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries
138(15)
Marc Mouffron
Frederic Rousseau
Huafei Zhu
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extactor
153(14)
Ning Ding
Dawu Gu
Secret Sharing
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
167(15)
Christophe Tartary
Josef Pieprzyk
Huaxiong Wang
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks
182(10)
Chuangui Ma
Rui Cheng
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images
192(9)
Daoshun Wang
Xiaobo Li
Feng Yi
Stream Cipher and Pseudorandmness
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
201(15)
Sultan Al Hinai
Lynn Margaret Batten
Bernard Colbert
Four Families of Binary Sequences with Low Correlation and Large Linear Complexity
216(15)
Jin-Song Wang
Wen-Feng Qi
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves
231(15)
Zhixiong Chen
Ning Zhang
Guozhen Xiao
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators
246(10)
Nicholas Kolokotronis
Konstantinos Limniotis
Nicholas Kalouptsidis
Boolean Functions
Linear Equation on Polynomial Single Cycle T-Functions
256(15)
Jin-Song Wang
Wen-Feng Qi
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables
271(12)
Longjiang Qu
Chao Li
Privacy and Deniability
Anonymity and k-Choice Identities
283(15)
Jacek Cichon
Mirostaw Kutytowski
Deniable Authentication on the Internet (Extended Abstract)
298(15)
Shaoquan Jiang
Orthogonality between Key Privacy and Data Privacy, Revisited
313(15)
Rui Zhang
Goichiro Hanaoka
Hideki Imai
Unlinkable Randomizable Signature and Its Application in Group Signature
328(15)
Sujing Zhou
Dongdai Lin
Hash Functions
An Improved Collision Attack on MD5 Algorithm
343(15)
Shiwei Chen
Chenhui Jin
Multivariates Polynomials for Hashing
358(14)
Jintai Ding
Bo-Yin Yang
Public Key Cryptosystems
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
372(12)
Chunxiang Gu
Yuefei Zhu
Heng Pan
Multi-Identity Single-Key Decryption without Random Oracles
384(15)
Fuchun Guo
Yi Mu
Zhide Chen
Li Xu
Public Key Analysis
Kipnis-Shamir Attack on HFE Revisited
399(13)
Xin Jiang
Jintai Ding
Lei Hu
Cryptanalysis of General Lu-Lee Type Systems
412(15)
Haijian Zhou
Ping Luo
Daoshun Wang
Yiqi Dai
A Timing-Resistant Elliptic Curve Backdoor in RSA
427(15)
Adam L. Young
Moti Yung
Application Security
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol
442(15)
Bin Zhao
Lanjun Dang
Weidong Kou
Jun Zhang
Zan Li
Kai Fan
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control
457(6)
Chin-Chen Chang
Yi-Fang Cheng
Iuon-Chang Lin
Systems Security and Trusted Computing
Building Trusted Sub-domain for the Grid with Trusted Computing
463(9)
Jing Zhan
Huanguo Zhang
Fei Yan
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
472(10)
Yongdong Wu
Feng Bao
Robert H. Deng
Marc Mouffron
Frederic Rousseau
Online Tracing Scanning Worm with Sliding Window
482(15)
Yang Xiang
Qiang Li
Network Security
A New Proactive Defense Model Based on Intrusion Deception and Traceback
497(10)
Junfeng Tian
Ning Li
On Modeling Post Decryption Error Processes in UMTS Air Interface
507(10)
Fouz Sattar
Muid Mufti
A Simple, Smart and Extensible Framework for Network Security Measurement
517(16)
Feng Cheng
Christian Wolter
Christoph Meinel
Author Index 533