信息安全與密碼學(xué)國(guó)際會(huì)議論文集

出版時(shí)間:2009-6  出版社:科學(xué)出版社  作者:林東岱 等主編  頁(yè)數(shù):172  
Tag標(biāo)簽:無(wú)  

前言

The Fourth China International Conference on Information Security and Cryptology (Inscrypt 2008) was co-organized by the State Key Laboratory of Information Security and by the Chinese Association for Cryptologic Research. The conference was held in Beijing, China in mid-december, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China.Given its four year success, Inscrypt is now a tradition. It is, in fact, a leading annual international event in the area of cryptography and information security taking place in China. We are pleased to report the continuous support of the entire community: authors, attendees, committee members, reviewers, sponsors and organizers. This state of affairs reflects the fact that the research areas covered by Inscrypt are important to modern computing, where increased security, trust, safety and reliability are required. This need makes sure that the relevant research community, world wide, continues producing important fundamental, experimental and applied work in the wide areas of cryptography and information security research. It is not a surprise that the scientific program of Inscrypt 2008 covered numerous fields of research within these general areas.The International Program Committee of Inscrypt 2008 received a total of 183 submissions from 23 countries and regions, from which only 28 submissions were selected for presentation as regular papers which are published by Springer in the series of Lecture Notes in Computer Science, and 12 submissions were selected as short paper presentations which are published in this proceedings. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were chosen to the various tracks. The selection to both tracks was a highly" competitive process. We also note that reviews of submissions by committee members were hidden from their authors throughout the entire review process. We further noted that due to the conference format, many good papers have not been accepted regrettably.Inscrypt 2008 was made possible by the joint efforts of numerous people and organizations worldwide. We take this opportunity to thank the Program Commitee members and the external experts they employed for their invaluable help in producing the conference program. We further thank the conference Organizing Committee, the various sponsors and the conference attendees. Last but not least, we express our great gratitude to all the authors who submitted papers to the conference, the invited speakers and the session Chairs.

內(nèi)容概要

本書是2008年12月在北京召開的第四屆中國(guó)密碼學(xué)與信息安全國(guó)際會(huì)議(The 4th China International Conference on InformarionSecurity and Cryptology-Inscrypt 2008)的短文論文集。Inscrypt系列國(guó)際會(huì)議是由信息安全國(guó)家重點(diǎn)實(shí)驗(yàn)室發(fā)起,與中國(guó)密碼學(xué)會(huì)聯(lián)合舉辦的高水平國(guó)際會(huì)議,每年在中國(guó)舉辦一次,該會(huì)議論文集由Springer出版社出版。本書收錄了這次會(huì)議的短文12篇。主要內(nèi)容包括密碼算法、數(shù)字簽名與認(rèn)證、安全協(xié)議、密碼實(shí)現(xiàn)與應(yīng)用等。    本書可供從事密碼學(xué)、信息安全、通信與信息系統(tǒng)、計(jì)算機(jī)應(yīng)用技術(shù)等專業(yè)的科技人員和高等院校師生參考。

書籍目錄

I  Stream Cipher and Elliptic Curve Algorithm Cryptanalysis of Generalized Self-shrinking Generator Fast Scalar Multiplication on a Family of Supersingular Curves over IF2mII  Digital Signature and Authentication Scheme An Efficient Proxy Signature Scheme without Random Oracle Model  Provable Secure Signature Scheme with Partial Sanitization and Disclosure  " An Evaluation of Improvement Scheme for Boundary Problem in Cancelable Biometrics Based on Block ScrambleIII  Key Management Protocols Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem New Two-Party Identity-based Authenticated Key Agreement Protocol without Random Oracles A Multilevel Secure Key Predistribution Scheme.in Wireless Sensor NetworksIV  Hardware Implementation and Side Channel  Attack FPGA & ASIC hnplementation of Differential Power:Analysis Attack on AES ……V  Applications and SteganographyAuthor Index

章節(jié)摘錄

插圖:

編輯推薦

《信息安全與密碼學(xué)國(guó)際會(huì)議論文集(2008)(英文)》為科學(xué)出版社出版。

圖書封面

圖書標(biāo)簽Tags

無(wú)

評(píng)論、評(píng)分、閱讀與下載


    信息安全與密碼學(xué)國(guó)際會(huì)議論文集 PDF格式下載


用戶評(píng)論 (總計(jì)0條)

 
 

 

250萬(wàn)本中文圖書簡(jiǎn)介、評(píng)論、評(píng)分,PDF格式免費(fèi)下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號(hào)-7