Information and Communications Security信息及通信安全

出版社:1 (2006年1月9日)
出版日期:2006-1
ISBN:9783540309345
作者:Sihan Qing
页数:492页

作者简介

  This book constitutes the refereed proceedings of the 7th International Conference on Information and Communications Security, ICICS 2005, held in Beijing, China in December 2005. The 40 revised full papers presented were carefully reviewed and selected from 235 submissions. The papers are organized in topical sections on fair exchange, digital signatures, cryptographic protocols, cryptanalysis, network security, applied cryptography, key management, access control, applications, watermarking, and system security.

书籍目录

Fair Exchange  An Evenhanded Certified Email System for Contract Signing  Efficient ID-Based Optimistic Fair Exchange with Provable Security  On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol  Generic, Optimistic, and Efficient Schemes for Fair Certified Email DeliveryDigital Signatures Ⅰ  Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security  On Delegatability of Four Designated Verifier Signatures  PIATS: A Partially Sanitizable Signature SchemeCryptographic Protocols  Ciphertext Comparison, a New Solution to the Millionaire Problem  Private Itemset Support Counting  Visual Cryptographic Protocols Using the Trusted Initializer\  Admissible Interference by Typing for Cryptographic ProtocolsCryptanalysis  On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation  On the Security of Encryption Modes of MD4, MD5 and HAVAL  Cryptanalysis of PASS II and MiniPass  Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic CurvesDigital Signatures Ⅱ  Asymmetric Concurrent Signatures  Generic Construction of (Identity-Based) Perfect Concurrent Signature,  Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation DomainsNetwork Security  Session Table Architecture for Defending SYN Flood Attack  A Behavior-Based Ingress Pate-Limiting Mechanism Against DoS/DDoS Attacks  Port Scan Behavior Diagnosis by Clustering ……Applied Cryptography Key ManagementAccess Control Applications Watermarking System SecurityAuthor Index


 Information and Communications Security信息及通信安全下载



发布书评

 
 


 

农业基础科学,时尚,美术/书法,绘画,软件工程/开发项目管理,研究生/本专科,爱情/情感,动漫学堂PDF下载,。 PDF下载网 

PDF下载网 @ 2024