Skip to main content
  • Conference proceedings
  • © 2006

Information Security and Cryptology

Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4318)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology

Conference proceedings info: Inscrypt 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 papers)

  1. Front Matter

  2. Digital Signature Schemes

    1. Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05

      • Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun
      Pages 1-12
    2. Identity-Based Key-Insulated Signature with Secure Key-Updates

      • Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
      Pages 13-26
    3. Efficient Intrusion-Resilient Signatures Without Random Oracles

      • Benoît Libert, Jean-Jacques Quisquater, Moti Yung
      Pages 27-41
  3. Sequences and Stream Ciphers

    1. New Constructions of Large Binary Sequences Family with Low Correlation

      • Xin Tong, Jie Zhang, Qiao-Yan Wen
      Pages 42-53
    2. On the Rate of Coincidence of Two Clock-Controlled Combiners

      • Xuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li
      Pages 54-65
  4. Symmetric-Key Cryptography

    1. OPMAC: One-Key Poly1305 MAC

      • Dayin Wang, Dongdai Lin, Wenling Wu
      Pages 78-87
  5. Cryptographic Schemes

    1. Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme

      • Christophe Tartary, Huaxiong Wang
      Pages 103-117
    2. A Revocation Scheme Preserving Privacy

      • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
      Pages 130-143
  6. Network Security

    1. Deterministic Packet Marking with Link Signatures for IP Traceback

      • Shi Yi, Yang Xinyu, Li Ning, Qi Yong
      Pages 144-152
    2. Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System

      • You Chen, Yang Li, Xue-Qi Cheng, Li Guo
      Pages 153-167
    3. A Network Security Policy Model and Its Realization Mechanism

      • Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao
      Pages 168-181
  7. Access Control

    1. A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty

      • Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou
      Pages 196-210
    2. Design and Implementation of Fast Access Control That Supports the Separation of Duty

      • SeongKi Kim, EunKyung Jin, YoungJin Song, SangYong Han
      Pages 211-224
  8. Computer and Applications Security

    1. Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks

      • Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hong
      Pages 238-252

About this book

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The research areas covered by Inscrypt have been gaining increased visibility recently since modern computing and communication infrastructures and app- cations require increased security, trust and safety. Indeed important fundam- tal, experimental and applied work has been done in wide areasof cryptography and information security research in recent years. Accordingly, the program of Inscrypt 2006 covered numerous ?elds of research within these areas. The International Program Committee of the conference received a total of 225 submissions, from which only 23 submissions were selected for presentation at the regular papers track and are part of this volume. In addition to this track, the conference also hosted a short paper track of 13 presentations that were carefully selected as well. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were selected to the various tracks.

Editors and Affiliations

  • University College London, UK

    Helger Lipmaa

  • Computer Science Department, Google Inc. and Columbia University, New York, NY, USA

    Moti Yung

  • SKLOIS Lab, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China

    Dongdai Lin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access