


default search action
Inscrypt 2006: Beijing, China
- Helger Lipmaa, Moti Yung, Dongdai Lin:

Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings. Lecture Notes in Computer Science 4318, Springer 2006, ISBN 3-540-49608-4
Digital Signature Schemes
- Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun:

Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. 1-12 - Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:

Identity-Based Key-Insulated Signature with Secure Key-Updates. 13-26 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:

Efficient Intrusion-Resilient Signatures Without Random Oracles. 27-41
Sequences and Stream Ciphers
- Xin Tong, Jie Zhang, Qiao-Yan Wen:

New Constructions of Large Binary Sequences Family with Low Correlation. 42-53 - Xuexian Hu

, Yongtao Ming, Wenfen Liu, Shiqu Li:
On the Rate of Coincidence of Two Clock-Controlled Combiners. 54-65
Symmetric-Key Cryptography
- Yuan-man Tong, Zhiying Wang, Kui Dai, Hongyi Lu:

Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. 66-77 - Dayin Wang, Dongdai Lin, Wenling Wu:

OPMAC: One-Key Poly1305 MAC. 78-87 - Debrup Chakraborty, Palash Sarkar:

A General Construction of Tweakable Block Ciphers and Different Modes of Operations. 88-102
Cryptographic Schemes
- Christophe Tartary, Huaxiong Wang:

Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. 103-117 - Changshe Ma:

Efficient Short Signcryption Scheme with Public Verifiability. 118-129 - Lukasz Krzywiecki

, Przemyslaw Kubiak, Miroslaw Kutylowski:
A Revocation Scheme Preserving Privacy. 130-143
Network Security
- Yi Shi, Xinyu Yang, Ning Li, Yong Qi:

Deterministic Packet Marking with Link Signatures for IP Traceback. 144-152 - You Chen, Yang Li, Xueqi Cheng, Li Guo:

Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. 153-167 - Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao:

A Network Security Policy Model and Its Realization Mechanism. 168-181 - Gaeil An, Joon S. Park:

Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. 182-195
Access Control
- Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou:

A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. 196-210 - SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han:

Design and Implementation of Fast Access Control That Supports the Separation of Duty. 211-224
Computer and Applications Security
- Liuying Tang, Sihan Qing:

A Practical Alternative to Domain and Type Enforcement Integrity Formal Models. 225-237 - Deok Jin Kim, Tae-Hyung Kim, Jong Kim, Sung Je Hong:

Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. 238-252 - Zhan Wang, Yoshiaki Hori, Kouichi Sakurai:

Application and Evaluation of Bayesian Filter for Chinese Spam. 253-263
Web and Media Security
- Yongdong Wu, Feng Bao:

Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. 264-278 - Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon, Jin Gi Choe, Yu Kang:

An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses. 279-288 - Marcel Fernandez, Josep Cotrina Navau:

Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. 289-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














