Cryptology and network security : 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010 : proceedings / Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.).

By: (9th : International Conference on Cryptology and Network Security (9th : 2010 : Kuala Lampur, Malaysia)
Contributor(s): Heng, Swee-Huay | Wright, Rebecca N, 1967- | Goi, Bok-Min
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 6467.; LNCS sublibrary: Publisher: Berlin : Springer, 2010Description: 1 online resource (xiii, 353 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642176197; 3642176194; 9783642176180; 3642176186Other title: CANS 2010Subject(s): Data encryption (Computer science) -- Congresses | Computer networks -- Access control -- Congresses | Computer networks -- Security measures -- Congresses | Informatique | Computer networks -- Access control | Computer networks -- Security measures | Data encryption (Computer science) | Rechnernetz | Datensicherung | Computersicherheit | Kryptosystem | Kryptoanalyse | Hash-Algorithmus | Kuala Lumpur <2010> | computerwetenschappen | computer sciences | wiskunde | mathematics | informatietheorie | information theory | algebra | gegevensstructuren | data structures | gegevensbeheer | data management | computernetwerken | computer networks | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic book | Electronic books | Conference papers and proceedings. | Kongress. Additional physical formats: Print version:: Cryptology and network security.DDC classification: 005.8 LOC classification: QA76.9.A25 | I58 2010Other classification: 54.62 | 54.32 Online resources: Click here to access online
Contents:
Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds -- An Algorithm Based Concurrent Error Detection Scheme for AES -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems -- Generating Parameters for Algebraic Torus-Based Cryptosystems -- Analysis of the MQQ Public Key Cryptosystem -- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) -- Secure Mechanisms -- Towards a Cryptographic Treatment of Publish/Subscribe Systems -- STE3D-CAP: Stereoscopic 3D CAPTCHA -- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic Group Key Exchange Revisited -- Towards Practical and Secure Coercion-Resistant Electronic Elections -- Anonymous Credentials -- Predicate Encryption with Partial Public Keys -- Anonymous Credential Schemes with Encrypted Attributes -- One Time Anonymous Certificate: X.509 Supporting Anonymity.
Summary: This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Network Security, CANS 2010, held in Kuala Lumpur, Malaysia, in December 2010. The 21 revised full papers, presented together with abstracts of 2 invited talks, were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on block ciphers, wireless network security, hash functions, public key cryptography, secure mechanisms, cryptographic protocols, and anonymous credentials.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Network Security, CANS 2010, held in Kuala Lumpur, Malaysia, in December 2010. The 21 revised full papers, presented together with abstracts of 2 invited talks, were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on block ciphers, wireless network security, hash functions, public key cryptography, secure mechanisms, cryptographic protocols, and anonymous credentials.

Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds -- An Algorithm Based Concurrent Error Detection Scheme for AES -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems -- Generating Parameters for Algebraic Torus-Based Cryptosystems -- Analysis of the MQQ Public Key Cryptosystem -- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) -- Secure Mechanisms -- Towards a Cryptographic Treatment of Publish/Subscribe Systems -- STE3D-CAP: Stereoscopic 3D CAPTCHA -- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic Group Key Exchange Revisited -- Towards Practical and Secure Coercion-Resistant Electronic Elections -- Anonymous Credentials -- Predicate Encryption with Partial Public Keys -- Anonymous Credential Schemes with Encrypted Attributes -- One Time Anonymous Certificate: X.509 Supporting Anonymity.

There are no comments for this item.

to post a comment.

Powered by Koha