书籍详情
《信息安全与密码学国际会议论文集》[47M]百度网盘|亲测有效|pdf下载
  • 信息安全与密码学国际会议论文集

  • 出版社:科学出版社职教京东自营官方旗舰店
  • 出版时间:2009-06
  • 热度:11706
  • 上架时间:2024-06-30 09:38:03
  • 价格:0.0
书籍下载
书籍预览
免责声明

本站支持尊重有效期内的版权/著作权,所有的资源均来自于互联网网友分享或网盘资源,一旦发现资源涉及侵权,将立即删除。希望所有用户一同监督并反馈问题,如有侵权请联系站长或发送邮件到ebook666@outlook.com,本站将立马改正

内容介绍

内容简介

《信息安全与密码学国际会议论文集(2008)(英文)》是2008年12月在北京召开的第四届中国密码学与信息安全国际会议(The4thChinaInternationalConferenceonInformarionSecurityandCryptology-Inscrypt2008)的短文论文集。Inscrypt系列国际会议是由信息安全国家重点实验室发起,与中国密码学会联合举办的高水平国际会议,每年在中国举办一次,该会议论文集由Springer出版社出版。《信息安全与密码学国际会议论文集(2008)(英文)》收录了这次会议的短文12篇。主要内容包括密码算法、数字签名与认证、安全协议、密码实现与应用等。《信息安全与密码学国际会议论文集(2008)(英文)》可供从事密码学、信息安全、通信与信息系统、计算机应用技术等专业的科技人员和高等院校师生参考。

内页插图

目录

ⅠStreamCipherandEllipticCurveAlgorithm
CryptanalysisofGeneralizedSelf-shrinkingGenerator
FastScalarMultiplicationonaFamilyofSupersingularCurvesoverIF2m

ⅡDigitalSignatureandAuthenticationScheme
AnEfficientProxySignatureSchemewithoutRandomOracleModel
ProvableSecureSignatureSchemewithPartialSanitizationandDisclosure"
AnEvaluationofImprovementSchemeforBoundaryProblemin
CancelableBiometricsBasedonBlockScramble

ⅢKeyManagementProtocols
StronglySecureAuthenticatedKeyExchangeProtocolBasedonComputationalDiffie-HellmanProblem
NewTwo-PartyIdentity-basedAuthenticatedKeyAgreementProtocolwithoutRandomOracles
AMultilevelSecureKeyPredistributionScheme.inWirelessSensorNetworks

ⅣHardwareImplementationandSideChannelAttack
FPGA&ASIChnplementationofDifferentialPower:AnalysisAttackonAES
RobustnessandInteroperabilityProblemsinSecurityDevices

ⅤApplicationsandSteganography
AnalysisandImprovementsofaSecureE-TenderSubmissionProtocol.
BlockBasedMinimumDistortionSteganography
AuthorIndex

前言/序言

  TheFourthChinaInternationalConferenceonInformationSecurityandCryptology(Inscrypt2008)wasco-organizedbytheStateKeyLaboratoryofInformationSecurityandbytheChineseAssociationforCryptologicResearch.TheconferencewasheldinBeijing,Chinainmid-december,andwasfurthersponsoredbytheInstituteofSoftware,theGraduateUniversityoftheChineseAcademyofSciencesandtheNationalNaturalScienceFoundationsofChina.
  Givenitsfouryearsuccess,Inscryptisnowatradition.Itis,infact,aleadingannualinternationaleventintheareaofcryptographyandinformationsecuritytakingplaceinChina.Wearepleasedtoreportthecontinuoussupportoftheentirecommunity:authors,attendees,committeemembers,reviewers,sponsorsandorganizers.ThisstateofaffairsreflectsthefactthattheresearchareascoveredbyInscryptareimportanttomoderncomputing,whereincreasedsecurity,trust,safetyandreliabilityarerequired.Thisneedmakessurethattherelevantresearchcommunity,worldwide,continuesproducingimportantfundamental,experimentalandappliedworkinthewideareasofcryptographyandinformationsecurityresearch.ItisnotasurprisethatthescientificprogramofInscrypt2008coverednumerousfieldsofresearchwithinthesegeneralareas.
  TheInternationalProgramCommitteeofInscrypt2008receivedatotalof183submissionsfrom23countriesandregions,fromwhichonly28submissionswereselectedforpresentationasregularpaperswhicharepublishedbySpringerintheseriesofLectureNotesinComputerScience,and12submissionswereselectedasshortpaperpresentationswhicharepublishedinthisproceedings.Allanonymoussubmissionswerereviewedbyexpertsintherelevantareasandbasedontheirranking,technicalremarksandstrictselectioncriteriathepaperswerechosentothevarioustracks.Theselectiontobothtrackswasahighly"competitiveprocess.Wealsonotethatreviewsofsubmissionsbycommitteememberswerehiddenfromtheirauthorsthroughouttheentirereviewprocess.Wefurthernotedthatduetotheconferenceformat,manygoodpapershavenotbeenacceptedregrettably.
  Inscrypt2008wasmadepossiblebythejointeffortsofnumerouspeopleandorganizationsworldwide.WetakethisopportunitytothanktheProgramCommiteemembersandtheexternalexpertstheyemployedfortheirinvaluablehelpinproducingtheconferenceprogram.WefurtherthanktheconferenceOrganizingCommittee,thevarioussponsorsandtheconferenceattendees.Lastbutnotleast,weexpressourgreatgratitudetoalltheauthorswhosubmittedpaperstotheconference,theinvitedspeakersandthesessionChairs.