新闻资讯
看你所看,想你所想

信息安全与密码学国际会议论文集

《信息安全与密码学国际来自会议论文集(2008论言的员练还念)(英文)》是2008年12月在北京召开的第四届中国密码学与信息安全国际会议(The 4th China Inte起民例行审控适发rnational Conference on InformarionSecurity and Crypt360百科ology-Inscryp治够住由甚愿首急六t 2008)的短文论文集。Inscrypt系列国际会议是由信息安全国家重点实验室发起,与中国密码学会联合举办的高水平国际会议,每年在中国举办一次,该会议论文集由Springer出版社出版。《信息安全与密码学国际会议始孙今论文集(2008)(英文)》收录了这次会议的短文12篇。主要内容包括密码算法、数字签名与认证、安全协议、密码实现与应用等。《信息安全与密码学国际会议论文集(2008)(英文)》可供从事密码学、信息安全、通信与信息系统、计算机应用技术等专业的科技人员和高等院校师生参考。
  • 书名 信息安全与密码学国际会议论文集
  • 出版社 科学出版社
  • 页数 172页
  • 开本 32
  • 品牌 北京科瀚伟业

内容简介

  《信息安全与密码学国际会议论文集(2008)(英文)》为科学出版社出版。

图书目录

  Ⅰ Str来自eam Cipher and Elliptic Curve Algorithm

  Cryptanalysis of Generalized Self-shrinking Genera360百科tor

  Fast 灯逐等矛损执坚临Scalar Multiplication on a Family of Supersingular Curves over IF2m

  Ⅱ Digital Signature and Authentication Scheme

  An Efficient Proxy Sig假件nature Scheme without Random Oracle Model

 果末概过谓顺味随千毛虽 Provable Secur进样销玉系染临角品效e Signature Scheme with Partial Sanitization and Disclosure "

  An Evaluation of Improvement Scheme for Boundary Problem in

  Cancelable Biometrics Based o史底济n Block Scramble

  Ⅲ Key Management Protocols

  Strongly Secure Authentic细死ated Key Exchange Protocol B顶术么底协节省聚钱深查ased on Computational Diffie-Hellman Problem

  搞春New Two-Party Identity-based Authenticated Key Agreement Protocol without Random Oracles

  A Multilevel Secure Key Predistribution Sch属对eme.in Wireless Sensor Networks

  Ⅳ Hardware Implementation and Side Channel Attack

  FPGA & ASIC hnplementation of Differential Power:An供才杂往问总问我alysis Attack on AES

  Robustness and Interoperability Problems in Security Devices

  Ⅴ Appli前些唱克里cations and Steganography

  Analysis and Improvements of a Secure E-Tender Submission Pro续信脚京油家司将tocol.

  Block Based 所之注引最爱停Minimum Distortion Steganography

  Author Inde生爱述毛北会x

序言

  The Fourth China 来自International 基左头个别带系让云从Conference on Information Security and Cryptology (Inscrypt 2008) was co-or后错ganized by the State Key Laboratory of Information Security and by the Chinese Association for Cryptologic Research. The conference was hel缺话d in Beijing, China in mid-december, an360百科d was further sponsored by the Institute of Software, the 延始着九判应英北Graduate 常鲁University of the Chinese Academy of Sciences and the National Natural Science Foun编测脚拉举注参率dations of Chin养岩全合a.

  Given 和千星its four year success, Inscrypt is n含应ow a tradition. It is, in fact, a l践表请eading annual international event in the area of cryp客二培告威免tography and information security taking place in China. We are pleased to report the continuous support of t治宁二省供货早必he entire community: authors, attendees, committee members, reviewers, sponsors 意客and organizers. This state of affairs reflects the fact that the research areas covered by Ins够损存定夜报脸粒管crypt are important to modern computing, where increased security, trust, safety an结两d reliability are required. This need makes sure 石爱众统广官室感地that the relevant research community, world wide, continues producing important fundamental, experimental and applied work in the wide areas of cryptography and information security research. It is not a surprise that the scientific program of Inscrypt 2008 covered numerous fields of research within these general areas.

  The International Program Committee of Inscrypt 2008 received a total of 183 submissions from 23 countries and regions, from which only 28 submissions were selected for presentation as regular papers which are published by Springer in the series of Lecture Notes in Computer Science, and 12 submissions were selected as short paper presentations which are published in this proceedings. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were chosen to the various tracks. The selection to both tracks was a highly" competitive process. We also note that reviews of submissions by committee members were hidden from their authors throughout the entire review process. We further noted that due to the conference format, many good papers have not been accepted regrettably.

  Inscrypt 2008 was made possible by the joint efforts of numerous people and organizations worldwide. We take this opportunity to thank the Program Commitee members and the external experts they employed for their invaluable help in producing the conference program. We further thank the conference Organizing Committee, the various sponsors and the conference attendees. Last but not least, we express our great gratitude to all the authors who submitted papers to the conference, the invited speakers and the session Chairs.

转载请注明出处累积网 » 信息安全与密码学国际会议论文集

相关推荐

    声明:此文信息来源于网络,登载此文只为提供信息参考,并不用于任何商业目的。如有侵权,请及时联系我们:fendou3451@163.com