The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The research areas covered by Inscrypt have been gaining increased visibility recently since modern computing and communication infrastructures and app- cations require increased security, trust and safety. Indeed important fundam- tal, experimental and applied work has been done in wide areasof cryptography and information security research in recent years. Accordingly, the program of Inscrypt 2006 covered numerous ?elds of research within these areas. The International Program Committee of the conference received a total of 225 submissions, from which only 23 submissions were selected for presentation at the regular papers track and are part of this volume. In addition to this track, the conference also hosted a short paper track of 13 presentations that were carefully selected as well. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were selected to the various tracks.
Author(s): Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun (auth.), Helger Lipmaa, Moti Yung, Dongdai Lin (eds.)
Series: Lecture Notes in Computer Science 4318 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 308
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity
Front Matter....Pages -
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05....Pages 1-12
Identity-Based Key-Insulated Signature with Secure Key-Updates....Pages 13-26
Efficient Intrusion-Resilient Signatures Without Random Oracles....Pages 27-41
New Constructions of Large Binary Sequences Family with Low Correlation....Pages 42-53
On the Rate of Coincidence of Two Clock-Controlled Combiners....Pages 54-65
Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining....Pages 66-77
OPMAC: One-Key Poly1305 MAC....Pages 78-87
A General Construction of Tweakable Block Ciphers and Different Modes of Operations....Pages 88-102
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme....Pages 103-117
Efficient Short Signcryption Scheme with Public Verifiability....Pages 118-129
A Revocation Scheme Preserving Privacy....Pages 130-143
Deterministic Packet Marking with Link Signatures for IP Traceback....Pages 144-152
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System....Pages 153-167
A Network Security Policy Model and Its Realization Mechanism....Pages 168-181
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic....Pages 182-195
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty....Pages 196-210
Design and Implementation of Fast Access Control That Supports the Separation of Duty....Pages 211-224
A Practical Alternative to Domain and Type Enforcement Integrity Formal Models....Pages 225-237
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks....Pages 238-252
Application and Evaluation of Bayesian Filter for Chinese Spam....Pages 253-263
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes....Pages 264-278
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses....Pages 279-288
Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes....Pages 289-303
Back Matter....Pages -