000 05752nam a22006855i 4500
001 978-3-642-01440-6
003 DE-He213
005 20240730190338.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642014406
_9978-3-642-01440-6
024 7 _a10.1007/978-3-642-01440-6
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aInformation Security and Cryptology
_h[electronic resource] :
_b4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers /
_cedited by Moti Yung, Peng Liu, Dongdai Lin.
250 _a1st ed. 2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2009.
300 _aXIII, 439 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5487
505 0 _aInvited Talks -- The State of Hash Functions and the NIST SHA-3 Competition -- Key Evolution Systems in Untrusted Update Environments -- Secure and Privacy-Preserving Information Brokering -- Digital Signature and Signcryption Schemes -- Provably Secure Convertible Nominative Signature Scheme -- Cryptanalysis of Two Ring Signcryption Schemes -- Efficient Signcryption Key Encapsulation without Random Oracles -- Privacy and Anonymity -- Strong Anonymous Signatures -- Publicly Verifiable Privacy-Preserving Group Decryption -- Privacy for Private Key in Signatures -- Message Authentication Code and Hash Function -- Security of Truncated MACs -- Security Analysis of Multivariate Polynomials for Hashing -- Secure Protocols -- SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming -- Batch ZK Proof and Verification of OR Logic -- Symmetric Cryptography -- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs -- Impossible Differential Analysis of Reduced Round CLEFIA -- Reducible Polynomial over Constructed by Trinomial ??LFSR -- Certificateless Cryptography -- Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model -- Further Observations on Certificateless Public Key Encryption -- Hardware Implementation and Side Channel Attack -- Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing -- New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA -- Wireless Network Security -- A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN -- Key Predistribution Schemes Using Codes in Wireless Sensor Networks -- Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks -- Public Key and Identity Based Cryptography -- On the ComputationalEfficiency of XTR+ -- A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme -- Inter-domain Identity-Based Proxy Re-encryption -- Access Control and Network Security -- Hardening Botnet by a Rational Botmaster -- Separation of Duty in Trust-Based Collaboration -- Trusted Computing and Applications -- An Integrity Assurance Mechanism for Run-Time Programs -- A Security and Performance Evaluation of Hash-Based RFID Protocols -- Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 0 _aData protection.
_97245
650 0 _aElectronic data processing
_xManagement.
_9142125
650 0 _aComputers and civilization.
_921733
650 0 _aComputer networks .
_931572
650 1 4 _aCryptology.
_931769
650 2 4 _aCoding and Information Theory.
_9142126
650 2 4 _aData and Information Security.
_931990
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputers and Society.
_931668
650 2 4 _aComputer Communication Networks.
_9142127
700 1 _aYung, Moti.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9142128
700 1 _aLiu, Peng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9142129
700 1 _aLin, Dongdai.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9142130
710 2 _aSpringerLink (Online service)
_9142131
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642014390
776 0 8 _iPrinted edition:
_z9783642014413
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5487
_9142132
856 4 0 _uhttps://doi.org/10.1007/978-3-642-01440-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c93201
_d93201