Get 40% off of select print and eBooks in Engineering & Materials Science!

Security and Cryptology

Information Security and Cryptology

Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings

Editors: Lipmaa, Helger, Yung, Moti, Lin, Donghai (Eds.)

Free Preview

Buy this book

eBook $74.99
price for USA in USD (gross)
  • ISBN 978-3-540-49610-6
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA in USD
  • ISBN 978-3-540-49608-3
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The research areas covered by Inscrypt have been gaining increased visibility recently since modern computing and communication infrastructures and app- cations require increased security, trust and safety. Indeed important fundam- tal, experimental and applied work has been done in wide areasof cryptography and information security research in recent years. Accordingly, the program of Inscrypt 2006 covered numerous ?elds of research within these areas. The International Program Committee of the conference received a total of 225 submissions, from which only 23 submissions were selected for presentation at the regular papers track and are part of this volume. In addition to this track, the conference also hosted a short paper track of 13 presentations that were carefully selected as well. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were selected to the various tracks.

Table of contents (23 chapters)

Table of contents (23 chapters)
  • Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05

    Pages 1-12

    Park, Haeryong (et al.)

  • Identity-Based Key-Insulated Signature with Secure Key-Updates

    Pages 13-26

    Weng, Jian (et al.)

  • Efficient Intrusion-Resilient Signatures Without Random Oracles

    Pages 27-41

    Libert, Benoît (et al.)

  • New Constructions of Large Binary Sequences Family with Low Correlation

    Pages 42-53

    Tong, Xin (et al.)

  • On the Rate of Coincidence of Two Clock-Controlled Combiners

    Pages 54-65

    Hu, Xuexian (et al.)

Buy this book

eBook $74.99
price for USA in USD (gross)
  • ISBN 978-3-540-49610-6
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA in USD
  • ISBN 978-3-540-49608-3
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information Security and Cryptology
Book Subtitle
Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
Editors
  • Helger Lipmaa
  • Moti Yung
  • Donghai Lin
Series Title
Security and Cryptology
Series Volume
4318
Copyright
2006
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-49610-6
DOI
10.1007/11937807
Softcover ISBN
978-3-540-49608-3
Edition Number
1
Number of Pages
XII, 308
Topics