
- 书名 信息安全与密码学国际会议论文集
- 出版社 科学出版社
- 页数 172页
- 开本 32
- 品牌 北京科瀚伟业
内容简介
《信息安全与密码学国际会议论文集(2008)(英文)》为科学出版社出版。
图书目录
Ⅰ Str来自eam Cipher and Elliptic Curve Algorithm
Cryptanalysis of Generalized Self-shrinking Genera360百科tor
Fast 灯逐等矛损执坚临Scalar Multiplication on a Family of Supersingular Curves over IF2m
Ⅱ Digital Signature and Authentication Scheme
An Efficient Proxy Sig假件nature Scheme without Random Oracle Model
果末概过谓顺味随千毛虽 Provable Secur进样销玉系染临角品效e Signature Scheme with Partial Sanitization and Disclosure "
An Evaluation of Improvement Scheme for Boundary Problem in
Cancelable Biometrics Based o史底济n Block Scramble
Ⅲ Key Management Protocols
Strongly Secure Authentic细死ated Key Exchange Protocol B顶术么底协节省聚钱深查ased on Computational Diffie-Hellman Problem
搞春New Two-Party Identity-based Authenticated Key Agreement Protocol without Random Oracles
A Multilevel Secure Key Predistribution Sch属对eme.in Wireless Sensor Networks
Ⅳ Hardware Implementation and Side Channel Attack
FPGA & ASIC hnplementation of Differential Power:An供才杂往问总问我alysis Attack on AES
Robustness and Interoperability Problems in Security Devices
Ⅴ Appli前些唱克里cations and Steganography
Analys句is and Improvements of a Secure E-Tender Submission Pro续信脚京油家司将tocol.
Block Based 所之注引最爱停Minimum Distortion Steganography
Author Inde生爱述毛北会x
序言
The Fourth China 来自International 基左头个别带系让云从Conference on Information Security and Cryptology (Inscrypt 2008) was co-or后错ganized by the State Key Laboratory of Information Security and by the Chinese Association for Cryptologic Research. The conference was hel缺话d in Beijing, China in mid-december, an360百科d was further sponsored by the Institute of Software, the 延始着九判应英北Graduate 常鲁University of the Chinese Academy of Sciences 那and the National Natural Science Foun编测脚拉举注参率dations of Chin养岩全合a.
Given 和千星its four year success, Inscrypt is n含应ow a tradition. It is, in fact, a l践表请eading annual international event in the area of cryp客二培告威免tography and information security taking place in China. We are pleased to report the continuous support of t治宁二省供货早必he entire community: authors, attendees, committee members, reviewers, sponsors 意客and organizers. This state of affairs reflects the fact that the research areas covered by Ins够损存定夜报脸粒管crypt are important to modern computing, where increased security, trust, safety an结两d reliability are required. This 但need makes sure 石爱众统广官室感地that the relevant research community, world wide, continues producing important fundamental, experimental and applied work in the wide areas of cryptography and information security research. It is not a surprise that the scientific program of Inscrypt 2008 covered numerous fields of research within these general areas.
The International Program Committee of Inscrypt 2008 received a total of 183 submissions from 23 countries and regions, from which only 28 submissions were selected for presentation as regular papers which are published by Springer in the series of Lecture Notes in Computer Science, and 12 submissions were selected as short paper presentations which are published in this proceedings. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were chosen to the various tracks. The selection to both tracks was a highly" competitive process. We also note that reviews of submissions by committee members were hidden from their authors throughout the entire review process. We further noted that due to the conference format, many good papers have not been accepted regrettably.
Inscrypt 2008 was made possible by the joint efforts of numerous people and organizations worldwide. We take this opportunity to thank the Program Commitee members and the external experts they employed for their invaluable help in producing the conference program. We further thank the conference Organizing Committee, the various sponsors and the conference attendees. Last but not least, we express our great gratitude to all the authors who submitted papers to the conference, the invited speakers and the session Chairs.
转载请注明出处累积网 » 信息安全与密码学国际会议论文集