Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings / John Ioannidis, Angelos Keromytis, Moti Yung (eds.).

By: (3rd : ACNS (Conference) (3rd : 2005 : New York, N.Y.)
Contributor(s): Ioannidis, John | Keromytis, Angelos | Yung, Moti
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 3531.Publisher: Berlin ; New York : Springer, 2005Description: 1 online resource (xi, 530 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540315421; 354031542X; 3540262237; 9783540262237Other title: ACNS 2005Subject(s): Telecommunication -- Security measures -- Congresses | Data encryption (Computer science) -- Congresses | Cryptography -- Congresses | Télécommunications -- Sécurité -- Mesures -- Congrès | Chiffrement (Informatique) -- Congrès | Cryptographie -- Congrès | COMPUTERS -- Security -- Cryptography | Informatique | Cryptography | Data encryption (Computer science) | Telecommunication -- Security measures | Authentifikation | Computersicherheit | Datensicherung | Kryptologie | Kryptosystem | Rechnernetz | Internet | informatieontsluiting | information retrieval | informatieopslag | information storage | informatiesystemen | information systems | internet | computerwetenschappen | computer sciences | computernetwerken | computer networks | gegevensbeheer | data management | operating systems | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. | Kongress. | New York (NY, 2005) Additional physical formats: Print version:: Applied cryptography and network security.DDC classification: 005.8/2 LOC classification: TK5102.85 | .A26 2005ebOnline resources: Click here to access online
Contents:
Two-server password-only authenticated key exchange / Jonathan Katz -- Strengthening password-based authentication protocols against online dictionary attacks / Peng Wang, Yongdae Kim, Vishal Kher -- Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme / Raphael C.-W. Phan and Bok-Min Goi -- Efficient security mechanisms for overlay multicast-based content distribution / Sencun Zhu, Chao Yao, Donggang Liu -- A traitor tracing scheme based on RSA for fast decryption / John Patrick McGregor, Yiqun Lisa Yin, and Ruby B. Lee -- N-party encrypted diffie-hellman key exchange using different passwords / Jin Wook Byun and Dong Hoon Lee -- Messin' with Texas deriving mother's maiden names using public records / Virgil Griffith and Markus Jakobsson -- Mitigating network denial-of-service through diversity-based traffic management / Ashraf Matrawy, Paul C. van Oorschot, and Anil Somayaji -- Searching for high-value rare events with uncheatable grid computing / Wenliang Du and Michael T. Goodrich -- Digital signatures do not guarantee exclusive ownership / Thomas Pornin and Julien P. Stern -- Thompson's group and public key cryptography / Vladimir Shpilrain and Alexander Ushakov -- Rainbow, a new multivariable polynomial signature scheme / Jintai Ding and Dieter Schmidt -- Badger : a fast and provably secure MAC / Martin Boesgaard, Thomas Christensen, and Erik Zenner -- IDS false alarm reduction using continuous and discontinuous patterns / Abdulrahman Alharby and Hideki Imai -- Indexing information for data forensics / Michael T. Goodrich, Mikhail J. Atallah, and Roberto Tamassia -- Model generalization and its implications on intrusion detection / Zhuowei Li, Amitabha Das, and Jianying Zhou -- Intrusion-resilient secure channels / Gene Itkis, Robert McNerney Jr., and Scott Russell -- Optimal asymmetric encryption and signature paddings Benoit Chevallier-Mames, Duong Hieu Phan, and David Pointcheval -- Efficient and leakage-resilient authenticated key transport protocol based on RSA / SeongHan Shin, Kazukuni Kobara, and Hideki Imi -- Identity based encryptionwithout redundancy / Benoit Libert and Jean-Jacques Quisquater -- OACerts : oblivious attribute certificates / Jiangtao Li and Ninghui Li-- Dynamic k-times anonymous authentication / Lan Nguyen and Rei Safavi-Naini -- Efficient anonymous roaming and its security analysis / Guomin Yang, Duncan S. Wong, and Xiaotie Deng -- Quantifying security in hybrid cellular networks / Markus Jakobsson and Liu Yang -- Off-line karma : a decentralized currency for peer-to-peer and grid applications / Flavio D. Garcia and Jaap-Henk Hoepman -- Building reliable mix networks with fair exchange / Michael K. Reiter, XiaoFeng Wang, and Matthew Wright -- SCARE of the DES (side channel analysis for reverse engineering of the data encryption standard) / Remy Daudigny, Herve Ledi and Frederic Muller -- Robust key extraction from physical uncloneable functions / B. Skoric, P. Tuyls, and W. Ophey -- Efficient constructions for one-way hash chains / Yih-Chun Hu, Markus Jakobsson, and Adrian Perrig -- Privacy preserving keyword searches on remote encrypted data / Yan-Cheng Chang and Michael Mitzenmacher -- An efficient solution to the millionaires' problem based on homomorphic encryption / Hsiao-Ying Lin and Wen-Guey Tzeng -- Non-interactive zero-knowledge arguments for voting / Jens Groth -- Short signature and universal designated verifier signature without random oracles / Rui Zhang, Jun Furukawa, and Hideki Imai -- Efficient identity based ring signature / Sherman S.M. Chow, Siu-Ming Yiu, and Lucas C.K. Hui -- New signature schemes with coupons and tight reduction / Benoit Chevallier-Mames.
Summary: "The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Communi-cations and Information Security Association). It was held at Columbia University in New York, USA, J une 7-10, 2005."
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

"The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Communi-cations and Information Security Association). It was held at Columbia University in New York, USA, J une 7-10, 2005."

Two-server password-only authenticated key exchange / Jonathan Katz -- Strengthening password-based authentication protocols against online dictionary attacks / Peng Wang, Yongdae Kim, Vishal Kher -- Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme / Raphael C.-W. Phan and Bok-Min Goi -- Efficient security mechanisms for overlay multicast-based content distribution / Sencun Zhu, Chao Yao, Donggang Liu -- A traitor tracing scheme based on RSA for fast decryption / John Patrick McGregor, Yiqun Lisa Yin, and Ruby B. Lee -- N-party encrypted diffie-hellman key exchange using different passwords / Jin Wook Byun and Dong Hoon Lee -- Messin' with Texas deriving mother's maiden names using public records / Virgil Griffith and Markus Jakobsson -- Mitigating network denial-of-service through diversity-based traffic management / Ashraf Matrawy, Paul C. van Oorschot, and Anil Somayaji -- Searching for high-value rare events with uncheatable grid computing / Wenliang Du and Michael T. Goodrich -- Digital signatures do not guarantee exclusive ownership / Thomas Pornin and Julien P. Stern -- Thompson's group and public key cryptography / Vladimir Shpilrain and Alexander Ushakov -- Rainbow, a new multivariable polynomial signature scheme / Jintai Ding and Dieter Schmidt -- Badger : a fast and provably secure MAC / Martin Boesgaard, Thomas Christensen, and Erik Zenner -- IDS false alarm reduction using continuous and discontinuous patterns / Abdulrahman Alharby and Hideki Imai -- Indexing information for data forensics / Michael T. Goodrich, Mikhail J. Atallah, and Roberto Tamassia -- Model generalization and its implications on intrusion detection / Zhuowei Li, Amitabha Das, and Jianying Zhou -- Intrusion-resilient secure channels / Gene Itkis, Robert McNerney Jr., and Scott Russell -- Optimal asymmetric encryption and signature paddings Benoit Chevallier-Mames, Duong Hieu Phan, and David Pointcheval -- Efficient and leakage-resilient authenticated key transport protocol based on RSA / SeongHan Shin, Kazukuni Kobara, and Hideki Imi -- Identity based encryptionwithout redundancy / Benoit Libert and Jean-Jacques Quisquater -- OACerts : oblivious attribute certificates / Jiangtao Li and Ninghui Li-- Dynamic k-times anonymous authentication / Lan Nguyen and Rei Safavi-Naini -- Efficient anonymous roaming and its security analysis / Guomin Yang, Duncan S. Wong, and Xiaotie Deng -- Quantifying security in hybrid cellular networks / Markus Jakobsson and Liu Yang -- Off-line karma : a decentralized currency for peer-to-peer and grid applications / Flavio D. Garcia and Jaap-Henk Hoepman -- Building reliable mix networks with fair exchange / Michael K. Reiter, XiaoFeng Wang, and Matthew Wright -- SCARE of the DES (side channel analysis for reverse engineering of the data encryption standard) / Remy Daudigny, Herve Ledi and Frederic Muller -- Robust key extraction from physical uncloneable functions / B. Skoric, P. Tuyls, and W. Ophey -- Efficient constructions for one-way hash chains / Yih-Chun Hu, Markus Jakobsson, and Adrian Perrig -- Privacy preserving keyword searches on remote encrypted data / Yan-Cheng Chang and Michael Mitzenmacher -- An efficient solution to the millionaires' problem based on homomorphic encryption / Hsiao-Ying Lin and Wen-Guey Tzeng -- Non-interactive zero-knowledge arguments for voting / Jens Groth -- Short signature and universal designated verifier signature without random oracles / Rui Zhang, Jun Furukawa, and Hideki Imai -- Efficient identity based ring signature / Sherman S.M. Chow, Siu-Ming Yiu, and Lucas C.K. Hui -- New signature schemes with coupons and tight reduction / Benoit Chevallier-Mames.

Print version record.

There are no comments for this item.

to post a comment.

Powered by Koha