日韩精品 中文字幕 动漫,91亚洲午夜一区,在线不卡日本v一区v二区丶,久久九九国产精品自在现拍

注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當前位置: 首頁出版圖書科學技術(shù)計算機/網(wǎng)絡(luò)信息安全信息安全及密碼術(shù)

信息安全及密碼術(shù)

信息安全及密碼術(shù)

定 價:¥542.40

作 者: Helger Lipmaa 著
出版社: 湖南文藝出版社
叢編項:
標 簽: 暫缺

購買這本書可以去


ISBN: 9783540496083 出版時間: 2006-12-01 包裝: 平裝
開本: 頁數(shù): 字數(shù):  

內(nèi)容簡介

  This book constitutes the refereed proceedings of the Second SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2006 (formerly CISC), held in Beijing, China in November/December 2006.The 23 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in topical sections on digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.

作者簡介

暫缺《信息安全及密碼術(shù)》作者簡介

圖書目錄

Digital Signature Schemes
 Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05
 Identity-Based Key-Insulated Signature with Secure Key-Updates
 Efficient Intrusion-Resilient Signatures Without Random Oracles
Sequences and Stream Ciphers
 New Constructions of Large Binary Sequences Family with Low Correlation
 On the Rate of Coincidence of Two Clock-Controlled Combiners
Symmetric-Key Cryptography
 Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining
 OPMAC: One-Key Polyl305 MAC
 A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Cryptographic Schemes
 Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
 Efficient Short Signcryption Scheme with Public Verifiability
 A Revocation Scheme Preserving Privacy
Network Security
 Deterministic Packet Marking with Link Signatures for IP Traceback
 Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
 A Network Security Policy Model and Its Realization Mechanism
 Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic
Access Control
 A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
 Design and Implementation of Fast Access Control That Supports the Separation of Duty
Computer and Applications Security
 A Practical Alternative to Domain and Type Enforcement Integrity Formal Models
 Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
 Application and Evaluation of Bayesian Filter for Chinese Spam
Web and Midia Security
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) rgspecialties.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號