TY - BOOK ID - 219049 TI - Information security and cryptology : third SKLOIS conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, revised selected papers AU - Pei, Dingyi AU - Inscrypt 2007 PY - 2008 SN - 3540794999 3540794980 PB - Berlin ; Heidelberg : Springer, DB - UniCat KW - Computer security KW - Cryptography KW - Computer security. KW - Data encryption (Computer science). KW - Information Systems. KW - Computer science. KW - Computer Communication Networks. KW - Computer software. KW - Systems and Data Security. KW - Cryptology. KW - Management of Computing and Information Systems. KW - Computers and Society. KW - Algorithm Analysis and Problem Complexity. KW - Software, Computer KW - Computer systems KW - Informatics KW - Science KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Computer privacy KW - Computer system security KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Security measures KW - Management information systems. KW - Computers and civilization. KW - Computer communication systems. KW - Algorithms. KW - Algorism KW - Algebra KW - Arithmetic KW - Communication systems, Computer KW - Computer communication systems KW - Data networks, Computer KW - ECNs (Electronic communication networks) KW - Electronic communication networks KW - Networks, Computer KW - Teleprocessing networks KW - Data transmission systems KW - Digital communications KW - Electronic systems KW - Information networks KW - Telecommunication KW - Cyberinfrastructure KW - Electronic data processing KW - Network computers KW - Civilization and computers KW - Civilization KW - Computer-based information systems KW - EIS (Information systems) KW - Executive information systems KW - MIS (Information systems) KW - Sociotechnical systems KW - Information resources management KW - Management KW - Foundations KW - Distributed processing KW - Communication systems KW - Data protection. KW - Cryptography. KW - Electronic data processing—Management. KW - Computer networks. KW - Data and Information Security. KW - IT Operations. KW - Cryptanalysis KW - Cryptology KW - Secret writing KW - Steganography KW - Signs and symbols KW - Symbolism KW - Writing KW - Ciphers KW - Data encryption (Computer science) KW - Data governance KW - Data regulation KW - Personal data protection KW - Protection, Data UR - https://www.unicat.be/uniCat?func=search&query=sysid:219049 AB - This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007. The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security. ER -