Information Security and Cryptology
Springer Berlin (Verlag)
978-3-642-01439-0 (ISBN)
Invited Talks.- The State of Hash Functions and the NIST SHA-3 Competition.- Key Evolution Systems in Untrusted Update Environments.- Secure and Privacy-Preserving Information Brokering.- Digital Signature and Signcryption Schemes.- Provably Secure Convertible Nominative Signature Scheme.- Cryptanalysis of Two Ring Signcryption Schemes.- Efficient Signcryption Key Encapsulation without Random Oracles.- Privacy and Anonymity.- Strong Anonymous Signatures.- Publicly Verifiable Privacy-Preserving Group Decryption.- Privacy for Private Key in Signatures.- Message Authentication Code and Hash Function.- Security of Truncated MACs.- Security Analysis of Multivariate Polynomials for Hashing.- Secure Protocols.- SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.- Batch ZK Proof and Verification of OR Logic.- Symmetric Cryptography.- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.- Impossible Differential Analysis of Reduced Round CLEFIA.- Reducible Polynomial over Constructed by Trinomial ??LFSR.- Certificateless Cryptography.- Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model.- Further Observations on Certificateless Public Key Encryption.- Hardware Implementation and Side Channel Attack.- Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.- New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA.- Wireless Network Security.- A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN.- Key Predistribution Schemes Using Codes in Wireless Sensor Networks.- Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks.- Public Key and Identity Based Cryptography.- On the ComputationalEfficiency of XTR+.- A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme.- Inter-domain Identity-Based Proxy Re-encryption.- Access Control and Network Security.- Hardening Botnet by a Rational Botmaster.- Separation of Duty in Trust-Based Collaboration.- Trusted Computing and Applications.- An Integrity Assurance Mechanism for Run-Time Programs.- A Security and Performance Evaluation of Hash-Based RFID Protocols.- Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.
Erscheint lt. Verlag | 6.4.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 439 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 698 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Ad-Hoc Networks • anonymity • authentication • bilinear pairings • Block Ciphers • Botnet • certificateless encryption • Code • Cryptanalysis • cryptographic protocols • cryptography • Data Security • DDoS attacks • Digital Signatures • Elliptic Curves • Hardcover, Softcover / Informatik, EDV/Informatik • hash function • honeypot • Identity • identity-based signcryption • Information • Information Hiding • Intrusion Detection • Key Management • Malware • multivariate cryptography • Network Security • pairings • privacy • provable security • Public Key • RFID security • rsa • security • security modeling • sensor networks • signature schemes • signcryption • Stream Ciphers • symmetric keys • System Security • threshold encryption • Trust • trusted computing |
ISBN-10 | 3-642-01439-9 / 3642014399 |
ISBN-13 | 978-3-642-01439-0 / 9783642014390 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich