BN.com Gift Guide

Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$101.58
Used and New from Other Sellers
Used and New from Other Sellers
from $93.74
Usually ships in 1-2 business days
(Save 37%)
Other sellers (Paperback)
  • All (9) from $93.74   
  • New (6) from $98.06   
  • Used (3) from $93.74   

More About This Textbook

Overview

This book constitutes the proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, held in Beijing, China, in June 2010.
The 32 papers presented in this volume were carefully reviewed and selected from 178 submissions. The papers are divided in topical sections on public key encryption, digital signature, block ciphers and hash functions, side-channel attacks, zero knowledge and multi-party prools, key management, authentication and identification, privacy and anonymity, RFID security and privacy, and internet security.

Read More Show Less

Product Details

Table of Contents

Public Key Encryption

On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption Damien Vergnaud Vergnaud, Damien 1

How to Construct Interval Encryption from Binary Tree Encryption Dongsheng Xing Xing, Dongsheng 19

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions Brent Waters Waters, Brent 35

Digital Signature

Trapdoor Sanitizable Signatures Made Easy Pil Joony Lee Lee, Pil Joony 53

Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs Dominique Schroder Schroder, Dominique 69

Redactable Signatures for Tree-Structured Data: Definitions and Constructions Dominique Schroder Schroder, Dominique 87

Block Ciphers and Hash Functions

Imposiible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions Chao Li Chao, Li 105

Multi-trail Statistical Saturation Attacks Francois-Xavier Standaert Standaert, Francois-Xavier 123

Multiset Collision Attacks on Reduced-Round SNOW 3G SNOW 3G⊗ Bin Zhang Bin, Zhang 139

High Performance GHASH Function for Long Messages M. Anwar Hasan Hasan, M. Anwar 154

Side-Channel Attacks

Principles on the Security of AES against First and Second-Order Differential Power Analysis Jerry den Hartog Hartog, Jerry den 168

Adaptive Chosen-Message Side-Channel Attacks Francois-Xavier Standaert Standaert, Francois-Xavier 186

Secure Multiplicative Masking of Powr Functions Michael Quisquater Quisquater, Michael 200

Zero Knowledge and Multi-Party Protocols

Batch Groth-Sahai Damien Vergnaud Vergnaud, Damien 218

Efficient and Secure Evaluation of Multivariate Polynomials and Applications Payman Mohassel Mohassel, Payman 236

Efficient Implementation of the Orlandi Protocol Janus Dam Nielsen Nielsen, Janus Dam 255

Improving the Round Complexity of Traitor Tracing Schemes Serdar Pehlivanoglu Pehlivanoglu, Serdar 273

Key Management

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters Thomas Icart Icart, Thomas 291

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Tal Rabin Rabin, Tal 309

Denialbe Internet Key Exchange Yunlei Zhao Zhao, Yunlei 329

Authentication and Identification

A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm Huaxiong Wang Wang, Huaxiong 349

Secure Sketch for Multiple Secrets Ee-Chien Chang Chang, Ee-Chien 367

A Message Recognition Protocol Based on Standard Assumptions Serge Vaudenay Vaudenay, Serge 384

Privacy and Anonymity

Affiliation-Hiding Key Exchange with untrusted Group Authorities Gene Tsudik Tsudik, Gene 402

Privacy-Preserving Group Discovery with Linear Complexity Bertram Poettering Poettering, Bertram 420

Two New Efficient PIR-Writing Protocols Bingsheng Zhang Zhang, Bingsheng 438

Regulatory Compliant Oblivious RAM Radu Sion Sion, Radu 456

RFID Security and Privacy

Revisiting Unpredictability-Based RFID Privacy Models Yingjju Li Li, Yingjju 475

On RFID Privacy with Mutual Authentication and Tag Corruption Christian Wachsmann Wachsmann, Christian 493

Internet Security

Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures Ravi Sandhu Sandhu, Ravi 511

COP: A Step toward Children Online Privacy Heng Xu Heng, Xu 529

A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising Xuhua Ding Ding, Xuhua 545

Author Index 563

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)