By Akira Matsunaga, Tsutomu Matsumoto (auth.), Mitsu Okada, Ichiro Satoh (eds.)

ISBN-10: 3540775048

ISBN-13: 9783540775041

This ebook constitutes the completely refereed post-proceedings of the eleventh Asian Computing technology convention, ASIAN 2006, held in Tokyo, Japan, in December 2006.The 17 revised complete papers and eight revised brief papers offered including 1 invited paper have been conscientiously chosen in the course of rounds of reviewing and revision from one hundred fifteen submissions. The papers conceal all facets of idea, perform, purposes, and reports with regards to safe software program and have new how one can practice theoretical and functional ideas in safe software program research, layout, improvement, and operation.

Show description

Read Online or Download Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers PDF

Best computers books

Download e-book for kindle: IN-350 Планирование и внедрение LDAP by

Данный курс предназначен для подготовки слушателей к использованию LDAP в качестве сервера идентификации. В курсе рассматриваются вопросы настройки, установки, структурирования и конфигурирования сервера разрешения имен с использованием сервиса LDAP сервера sunlight ONE (Open community surroundings) в операционной системе Solaris nine.

Additional info for Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers

Sample text

Ideally, public keys should only comprise one group element as in identity-based key agreement. This paper proposes a new certificateless authenticated two-party key agreement protocol [5] that is more efficient than AP’s protocol. Each entity involved in the protocol is only required to compute two pairings, and the public keys exchanged by the entities only comprise one group element. As public keys are not bound to a specific key generation center (KGC), the protocol can also be used to establish session keys between users of different KGCs.

In Section 3 we propose a new certificateless authenticated two-party key agreement protocol, and in Section 4 we show how the protocol can be used by entities of different KGCs. In Section 5 and 6 we analyze the security and the efficiency of the protocol respectively, and in Section 7 we provide a conclusion of the paper. 1 Preliminaries Bilinear Pairings Let G1 be an additive group with a large prime order q and let G2 be a multiplicative group of the same order. An admissible pairing e is then a function e : G1 × G1 → G2 that satisfies the following properties: 1.

C : Y }n ]]) =df W1 ∨ (F1 ; W2 ) f au([[{A ? C : Y }n ]]) =df F1 ; F2 ter([[{A ? C : Y }n ]]) =df (T1 ; Comp(C, n)) ∨ (F1 ; T2 ) where, Comp(C, n) =df δ = 0 ∧ s1 = ((P, n) : s2) s1 ∧ ([[P ]] ⇒ [[C]]) ∧ s2 = . C : Y }n , if process A terminates successfully, the whole process also terminates successfully. In this case, program C will be installed for the later compensation use, which has been expressed using the behaviour Comp(C, n) shown above. Further, if process A encounters a fault which activates the execution of process Y , and the execution of Y terminates successfully, the whole process also terminates successfully.

Download PDF sample

Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers by Akira Matsunaga, Tsutomu Matsumoto (auth.), Mitsu Okada, Ichiro Satoh (eds.)


by Robert
4.5

Rated 4.45 of 5 – based on 32 votes