Table of Contents for: Information security practice and experi

 Staff view

You must be logged in to Tag Records

Information security practice and experience [electronic resource] : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 : proceedings /

Feng Bao, Hui Li, Guilin Wang (eds.).

Book Cover
Names: Bao, Feng, | Li, Hui, | Wang, Guilin,
Published: Berlin ; Springer, 2009.
Series: LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 5451.
Topics: Computer security - Congresses. | Computer networks - Security measures - Congresses. | Data protection - Congresses.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


Efficient and provable secure ciphertext-policy attribute-based encryption schemes -- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length -- RSA-based certificateless public key encryption -- Strongly unforgeable ID-based signatures without random oracles -- On the security of a certificate-based signature scheme and its improvement with pairings -- An empirical investigation into the security of phone features in SIP-based VoIP systems -- Reconstructing a packed DLL binary for static analysis -- Static analysis of a class of memory leaks in trustBSD MAC framework -- Efficient concurrent n poly (log n )-simulatable argument of knowledge -- New constructions for reusable, non-erasure and universally composable commitments -- Certificateless hybrid signcryption -- On non-representable secret sharing matroids -- A novel adaptive watermarking scheme based on human visual system and particle swarm optimization -- Defending against the pirate evolution attack -- Security specification for conversion technologies of heterogeneous DRM systems -- Analysing protocol implementations -- Measuring anonymity -- A hybrid e-voting scheme -- A framework for authenticated key exchange in the standard model -- Secret handshake : Strong anonymity definition and construction -- An extended authentication and key agreement protocol of UMTS -- Hash-based key management schemes for MPEG4-FGS -- Twister--a framework for secure and fast hash functions -- Preimage attack on hash function RIPEMD -- Full key-recovery attack on the HMAC/NMAC based on 3 and 4-pass HAVAL -- Memoryless related-key boomerang attack on the full tiger block cipher -- Memoryless related-key boomerang attack on 39-round SHACAL-2 -- Some new observations on the sms4 block cipher in the chinese WAPI standard -- On the correctness of an approach against side-channel attacks -- Ranking attack graphs with graph neural networks -- Implementing IDS management on lock-keeper -- Ensuring dual security modes in RFID-enabled supply chain systems -- Achieving better privacy protection in wireless sensor networks using trusted computing -- Trusted privacy domains--challenges for trusted computing in privacy-protecting information sharing.

Table of Contents for: Information security practice and experi