default search action
Inscrypt 2006: Beijing, China
- Helger Lipmaa, Moti Yung, Dongdai Lin:
Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings. Lecture Notes in Computer Science 4318, Springer 2006, ISBN 3-540-49608-4
Digital Signature Schemes
- Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun:
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. 1-12 - Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Key-Insulated Signature with Secure Key-Updates. 13-26 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Efficient Intrusion-Resilient Signatures Without Random Oracles. 27-41
Sequences and Stream Ciphers
- Xin Tong, Jie Zhang, Qiao-Yan Wen:
New Constructions of Large Binary Sequences Family with Low Correlation. 42-53 - Xuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li:
On the Rate of Coincidence of Two Clock-Controlled Combiners. 54-65
Symmetric-Key Cryptography
- Yuan-man Tong, Zhiying Wang, Kui Dai, Hongyi Lu:
Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. 66-77 - Dayin Wang, Dongdai Lin, Wenling Wu:
OPMAC: One-Key Poly1305 MAC. 78-87 - Debrup Chakraborty, Palash Sarkar:
A General Construction of Tweakable Block Ciphers and Different Modes of Operations. 88-102
Cryptographic Schemes
- Christophe Tartary, Huaxiong Wang:
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. 103-117 - Changshe Ma:
Efficient Short Signcryption Scheme with Public Verifiability. 118-129 - Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
A Revocation Scheme Preserving Privacy. 130-143
Network Security
- Yi Shi, Xinyu Yang, Ning Li, Yong Qi:
Deterministic Packet Marking with Link Signatures for IP Traceback. 144-152 - You Chen, Yang Li, Xueqi Cheng, Li Guo:
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. 153-167 - Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao:
A Network Security Policy Model and Its Realization Mechanism. 168-181 - Gaeil An, Joon S. Park:
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. 182-195
Access Control
- Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou:
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. 196-210 - SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han:
Design and Implementation of Fast Access Control That Supports the Separation of Duty. 211-224
Computer and Applications Security
- Liuying Tang, Sihan Qing:
A Practical Alternative to Domain and Type Enforcement Integrity Formal Models. 225-237 - Deok Jin Kim, Tae-Hyung Kim, Jong Kim, Sung Je Hong:
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. 238-252 - Zhan Wang, Yoshiaki Hori, Kouichi Sakurai:
Application and Evaluation of Bayesian Filter for Chinese Spam. 253-263
Web and Media Security
- Yongdong Wu, Feng Bao:
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. 264-278 - Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon, Jin Gi Choe, Yu Kang:
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses. 279-288 - Marcel Fernandez, Josep Cotrina Navau:
Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. 289-303
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.