Cryptology and Network Security: 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / Edition 1

Cryptology and Network Security: 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / Edition 1

by Yvo G. Desmedt
     
 

ISBN-10: 3540308490

ISBN-13: 9783540308492

Pub. Date: 01/09/2006

Publisher: Springer Berlin Heidelberg

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology and Network Security, CANS 2005, held in Xiamen, China in December 2005. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on cryptanalysis,

Overview

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology and Network Security, CANS 2005, held in Xiamen, China in December 2005. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management.

Product Details

ISBN-13:
9783540308492
Publisher:
Springer Berlin Heidelberg
Publication date:
01/09/2006
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #3810
Edition description:
2005
Pages:
352
Product dimensions:
0.76(w) x 6.14(h) x 9.21(d)

Table of Contents

Cryptanalysis.- The Second-Preimage Attack on MD4.- On the Security of Certificateless Signature Schemes from Asiacrypt 2003.- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.- Cryptanalysis of Two Group Key Management Prools for Secure Multicast.- Security Analysis of Password-Authenticated Key Agreement Prools.- Intrusion Detection and Viruses.- An Immune-Based Model for Computer Virus Detection.- A New Model for Dynamic Intrusion Detection.- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.- Authentication and Signature.- ID-Based Aggregate Signatures from Bilinear Pairings.- Efficient Identity-Based Signatures and Blind Signatures.- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.- Signcryption.- Two Proxy Signcryption Schemes from Bilinear Pairings.- Constructing Secure Warrant-Based Proxy Signcryption Schemes.- E-mail Security.- Design and Implementation of an Inline Certified E-mail Service.- Efficient Identity-Based Prool for Fair Certified E-mail Delivery.- Cryptosystems.- Similar Keys of Multivariate Quadratic Public Key Cryptosystems.- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.- Constructions of Almost Resilient Functions.- Privacy and Tracing.- A Novel Method to Maintain Privacy in Mobile Agent Applications.- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.- Information Hiding.- Revaluation of Error Correcting Coding in Watermarking Channel.- Firewalls, Denial of Service and DNS Security.- On the Performance and Analysis of DNS Security Extensions.- On Securing RTP-Based Streaming Content with Firewalls.- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.- Trust Management.- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >