微信扫一扫,移动浏览光盘
简介
This book constitutes the refereed proceedings of the First SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, CISC 2005, held in Beijing, China in December 2005. The 33 revised full papers and 32 short papers presented together with 2 invited papers were carefully reviewed and selected from 196 submissions. The papers are organized in topical sections on identity based cryptography, security modelling, systems security, signature schemes, symmetric key mechanisms, zero-knowledge and secure computations, threshold cryptography, intrusion detection systems, protocol cryptanalysis, ECC algorithms, applications, secret sharing, and denial of service attacks.
目录
Invited Talks
On Bluetooth Repairing:Key Agreement Based on Symmetric—Key Cryptography
You Can Prove So Many Things in Zero—Knowledge
Identity Based Cryptography
Improvements on Security Proofs of Some Identity Based Encryption Schemes
An ID—Based Verifiable Encrypted Signature Scheme Based on Hess’S Scheme
ID—Based Signature Scheme Without Trusted PKG
Security Modelling
Specifying Authentication Using Signal Events in CSP
Modeling RFID Security
Systems Security
Enforcing Email Addresses Privacy Using Tokens
Emcient Authentication of Electronic Document W10rkflow
Signature Schemes
Practical Strong Designated Verifier Signature Schemes Based on
Double Discrete Logarithms
Efficient Group Signatures from Bilinear Pairing
Enhanced Aggregate Signatures from Pairings
Constructing Secure Proxy Cryptosystem
Symmetric Key Mechanisms
HCTR:A Variable.Input-Length Enciphering Mode
The kth—Order Quasi—Generalized Bent Functions over Ring Zp
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences
Zero—Knowledge and Secure Computations
An Unbounded Simulation.Sound Non.interactive Zero--Knowledge Proof System for NP
An Improved Secure Two-Party Computation Protocol
Threshold Cryptography
Security AnMysis of Some Threshold Signature Schemes and
Multi—signature Schemes
ID-Beaed Threshold Unsigncryption Scheme from Parings
Intrusion Detection Systems
Protocol Ctyptanalsis
ECC Algorithms
Applications
Secret Sharing
Denial of Service Attacks
Author Index
On Bluetooth Repairing:Key Agreement Based on Symmetric—Key Cryptography
You Can Prove So Many Things in Zero—Knowledge
Identity Based Cryptography
Improvements on Security Proofs of Some Identity Based Encryption Schemes
An ID—Based Verifiable Encrypted Signature Scheme Based on Hess’S Scheme
ID—Based Signature Scheme Without Trusted PKG
Security Modelling
Specifying Authentication Using Signal Events in CSP
Modeling RFID Security
Systems Security
Enforcing Email Addresses Privacy Using Tokens
Emcient Authentication of Electronic Document W10rkflow
Signature Schemes
Practical Strong Designated Verifier Signature Schemes Based on
Double Discrete Logarithms
Efficient Group Signatures from Bilinear Pairing
Enhanced Aggregate Signatures from Pairings
Constructing Secure Proxy Cryptosystem
Symmetric Key Mechanisms
HCTR:A Variable.Input-Length Enciphering Mode
The kth—Order Quasi—Generalized Bent Functions over Ring Zp
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences
Zero—Knowledge and Secure Computations
An Unbounded Simulation.Sound Non.interactive Zero--Knowledge Proof System for NP
An Improved Secure Two-Party Computation Protocol
Threshold Cryptography
Security AnMysis of Some Threshold Signature Schemes and
Multi—signature Schemes
ID-Beaed Threshold Unsigncryption Scheme from Parings
Intrusion Detection Systems
Protocol Ctyptanalsis
ECC Algorithms
Applications
Secret Sharing
Denial of Service Attacks
Author Index
信息安全及密码术Information Security and Cryptology
- 名称
- 类型
- 大小
光盘服务联系方式: 020-38250260 客服QQ:4006604884
云图客服:
用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问
Video Player
×
Audio Player
×
pdf Player
×