Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / Edition 1

Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / Edition 1

by Jianying Zhou
     
 

ISBN-10: 3540202080

ISBN-13: 9783540202080

Pub. Date: 12/05/2003

Publisher: Springer Berlin Heidelberg

This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003.

The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications,

…  See more details below

Overview

This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003.

The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications, intrusion detection, cryptographic algorithms, digital signatures, security modeling, Web security, security prools, cryptanalysis, key management, and efficient implementations.

Product Details

ISBN-13:
9783540202080
Publisher:
Springer Berlin Heidelberg
Publication date:
12/05/2003
Series:
Lecture Notes in Computer Science Series, #2846
Edition description:
2003
Pages:
440
Product dimensions:
9.21(w) x 6.14(h) x 0.91(d)

Table of Contents

Cryptographic Applications.- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.- Optimized— 2-Attack against RC6.- Anonymity-Enhanced Pseudonym System.- Intrusion Detection.- Using Feedback to Improve Masquerade Detection.- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.- An IP Traceback Scheme Integrating DPM and PPM.- Cryptographic Algorithms.- Improved Scalable Hash Chain Traversal.- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.- On the Security of Two Threshold Signature Schemes with Traceable Signers.- Digital Signature.- Proxy and Threshold One-Time Signatures.- A Threshold GQ Signature Scheme.- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary.- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.- Security Modelling.- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.- An Authorization Model for E-consent Requirement in a Health Care Application.- PLI: A New Framework to Protect Digital Content for P2P Networks.- Web Security.- Improved Algebraic Traitor Tracing Scheme.- Common Vulnerability Markup Language.- Trust on Web Browser: Attack vs. Defense.- Security Prools.- Security Prools for Biometrics-Based Cardholder Authentication in Smartcards.- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Prool without Trusted Third Party.- Using OCSP to Secure Certificate-Using Transactions in M-commerce.- Cryptanalysis.- Differential Fault Analysis on A.E.S.- Side-Channel Attack on Substitution Blocks.- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.- A Fast Correlation Attack for LFSR-Based Stream Ciphers.- Key Management.- Making the Key Agreement Prool in Mobile ad hoc Network More Efficient.- An Efficient Tree-Based Group Key Agreement Using Bilinear Map.- A Key Recovery Mechanism for Reliable Group Key Management.- Efficient Implementations.- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.- Efficient Distributed Signcryption Scheme as Group Signcryption.- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >