home libri books Fumetti ebook dvd top ten sconti 0 Carrello

Torna Indietro

wu chuan-kun (curatore); yung moti (curatore); lin dongdai (curatore) - information security and cryptology

Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers

; ;

Disponibilità: Normalmente disponibile in 15 giorni

54,98 €
52,23 €

Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.

Pagabile anche con 18App Bonus Cultura e Carta del Docente

Facebook Twitter Aggiungi commento

Spese Gratis


Lingua: Inglese


Pubblicazione: 10/2012
Edizione: 2012


This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.


Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.- Cryptanalysis vs. Provable Security.- Boosting Scalability in Anomaly-Based Packed Executable Filtering.- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs.- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.- Adleman-Manders-Miller Root Extraction Method Revisited.- Multi-pixel Encryption Visual Cryptography.- An Improved Electronic Voting Scheme without a Trusted Random Number Generator.- Fault Attacks against the Miller Algorithm in Hessian Coordinates.- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.- Improved Tradeoff between Encapsulation and Decapsulation of HK09.- Non-interactive Deniable Authentication Protocols.- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.- Efficient Self-certified Signatures with Batch Verification.- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.- Weak-Key Class of MISTY1 for Related-Key Differential Attack.- Cryptanalysis of Reduced-Round KLEIN Block Cipher.- An Efficient RSA Implementation without Precomputation.- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.- Towards Attack Resilient Social Network Based Threshold Signing.- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.

Altre Informazioni



Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm Ø 617 gr
Formato: Brossura
Illustration Notes:X, 396 p. 56 illus.
Pagine Arabe: 396
Pagine Romane: x

Dicono di noi