信息安全及密码术Information Security and Cryptology

副标题:无

作   者:Dengguo Feng 等著

分类号:

ISBN:9783540308553

微信扫一扫,移动浏览光盘

简介

This book constitutes the refereed proceedings of the First SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, CISC 2005, held in Beijing, China in December 2005. The 33 revised full papers and 32 short papers presented together with 2 invited papers were carefully reviewed and selected from 196 submissions. The papers are organized in topical sections on identity based cryptography, security modelling, systems security, signature schemes, symmetric key mechanisms, zero-knowledge and secure computations, threshold cryptography, intrusion detection systems, protocol cryptanalysis, ECC algorithms, applications, secret sharing, and denial of service attacks.

目录

Invited Talks
 On Bluetooth Repairing:Key Agreement Based on Symmetric—Key Cryptography
 You Can Prove So Many Things in Zero—Knowledge
Identity Based Cryptography
 Improvements on Security Proofs of Some Identity Based Encryption Schemes
 An ID—Based Verifiable Encrypted Signature Scheme Based on Hess’S Scheme
ID—Based Signature Scheme Without Trusted PKG
Security Modelling
 Specifying Authentication Using Signal Events in CSP
 Modeling RFID Security
Systems Security
 Enforcing Email Addresses Privacy Using Tokens
 Emcient Authentication of Electronic Document W10rkflow
Signature Schemes
 Practical Strong Designated Verifier Signature Schemes Based on
Double Discrete Logarithms
 Efficient Group Signatures from Bilinear Pairing
 Enhanced Aggregate Signatures from Pairings
 Constructing Secure Proxy Cryptosystem
Symmetric Key Mechanisms
 HCTR:A Variable.Input-Length Enciphering Mode
 The kth—Order Quasi—Generalized Bent Functions over Ring Zp
 A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences
Zero—Knowledge and Secure Computations
 An Unbounded Simulation.Sound Non.interactive Zero--Knowledge Proof System for NP
 An Improved Secure Two-Party Computation Protocol
Threshold Cryptography
 Security AnMysis of Some Threshold Signature Schemes and
 Multi—signature Schemes
 ID-Beaed Threshold Unsigncryption Scheme from Parings
Intrusion Detection Systems
Protocol Ctyptanalsis
ECC Algorithms
Applications
Secret Sharing
Denial of Service Attacks
Author Index

已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

信息安全及密码术Information Security and Cryptology
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    loading icon