《信息安全与密码学国际会议论文集》[40M]百度网盘|pdf下载|亲测有效
《信息安全与密码学国际会议论文集》[40M]百度网盘|pdf下载|亲测有效

信息安全与密码学国际会议论文集 pdf下载

出版社 科学出版社职教自营店
出版年 2009-06
页数 390页
装帧 精装
评分 9.2(豆瓣)
8.99¥ 10.99¥

内容简介

本篇主要提供信息安全与密码学国际会议论文集电子书的pdf版本下载,本电子书下载方式为百度网盘方式,点击以上按钮下单完成后即会通过邮件和网页的方式发货,有问题请联系邮箱ebook666@outlook.com

内容简介

《信息安全与密码学国际会议论文集(2008)(英文)》是2008年12月在北京召开的第四届中国密码学与信息安全国际会议(The4thChinaInternationalConferenceonInformarionSecurityandCryptology-Inscrypt2008)的短文论文集。Inscrypt系列国际会议是由信息安全国家重点实验室发起,与中国密码学会联合举办的高水平国际会议,每年在中国举办一次,该会议论文集由Springer出版社出版。《信息安全与密码学国际会议论文集(2008)(英文)》收录了这次会议的短文12篇。主要内容包括密码算法、数字签名与认证、安全协议、密码实现与应用等。《信息安全与密码学国际会议论文集(2008)(英文)》可供从事密码学、信息安全、通信与信息系统、计算机应用技术等专业的科技人员和高等院校师生参考。

内页插图

目录

ⅠStreamCipherandEllipticCurveAlgorithm
CryptanalysisofGeneralizedSelf-shrinkingGenerator
FastScalarMultiplicationonaFamilyofSupersingularCurvesoverIF2m

ⅡDigitalSignatureandAuthenticationScheme
AnEfficientProxySignatureSchemewithoutRandomOracleModel
ProvableSecureSignatureSchemewithPartialSanitizationandDisclosure"
AnEvaluationofImprovementSchemeforBoundaryProblemin
CancelableBiometricsBasedonBlockScramble

ⅢKeyManagementProtocols
StronglySecureAuthenticatedKeyExchangeProtocolBasedonComputationalDiffie-HellmanProblem
NewTwo-PartyIdentity-basedAuthenticatedKeyAgreementProtocolwithoutRandomOracles
AMultilevelSecureKeyPredistributionScheme.inWirelessSensorNetworks

ⅣHardwareImplementationandSideChannelAttack
FPGA&ASIChnplementationofDifferentialPower:AnalysisAttackonAES
RobustnessandInteroperabilityProblemsinSecurityDevices

ⅤApplicationsandSteganography
AnalysisandImprovementsofaSecureE-TenderSubmissionProtocol.
BlockBasedMinimumDistortionSteganography
AuthorIndex

前言/序言

  TheFourthChinaInternationalConferenceonInformationSecurityandCryptology(Inscrypt2008)wasco-organizedbytheStateKeyLaboratoryofInformationSecurityandbytheChineseAssociationforCryptologicResearch.TheconferencewasheldinBeijing,Chinainmid-december,andwasfurthersponsoredbytheInstituteofSoftware,theGraduateUniversityoftheChineseAcademyofSciencesandtheNationalNaturalScienceFoundationsofChina.
  Givenitsfouryearsuccess,Inscryptisnowatradition.Itis,infact,aleadingannualinternationaleventintheareaofcryptographyandinformationsecuritytakingplaceinChina.Wearepleasedtoreportthecontinuoussupportoftheentirecommunity:authors,attendees,committeemembers,reviewers,sponsorsandorganizers.ThisstateofaffairsreflectsthefactthattheresearchareascoveredbyInscryptareimportanttomoderncomputing,whereincreasedsecurity,trust,safetyandreliabilityarerequired.Thisneedmakessurethattherelevantresearchcommunity,worldwide,continuesproducingimportantfundamental,experimentalandappliedworkinthewideareasofcryptographyandinformationsecurityresearch.ItisnotasurprisethatthescientificprogramofInscrypt2008coverednumerousfieldsofresearchwithinthesegeneralareas.
  TheInternationalProgramCommitteeofInscrypt2008receivedatotalof183submissionsfrom23countriesandregions,fromwhichonly28submissionswereselectedforpresentationasregularpaperswhicharepublishedbySpringerintheseriesofLectureNotesinComputerScience,and12submissionswereselectedasshortpaperpresentationswhicharepublishedinthisproceedings.Allanonymoussubmissionswerereviewedbyexpertsintherelevantareasandbasedontheirranking,technicalremarksandstrictselectioncriteriathepaperswerechosentothevarioustracks.Theselectiontobothtrackswasahighly"competitiveprocess.Wealsonotethatreviewsofsubmissionsbycommitteememberswerehiddenfromtheirauthorsthroughouttheentirereviewprocess.Wefurthernotedthatduetotheconferenceformat,manygoodpapershavenotbeenacceptedregrettably.
  Inscrypt2008wasmadepossiblebythejointeffortsofnumerouspeopleandorganizationsworldwide.WetakethisopportunitytothanktheProgramCommiteemembersandtheexternalexpertstheyemployedfortheirinvaluablehelpinproducingtheconferenceprogram.WefurtherthanktheconferenceOrganizingCommittee,thevarioussponsorsandtheconferenceattendees.Lastbutnotleast,weexpressourgreatgratitudetoalltheauthorswhosubmittedpaperstotheconference,theinvitedspeakersandthesessionChairs.