Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3810 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Cryptanalysis
- The Second-Preimage Attack on MD4
- On the Security of Certificateless Signature Schemes from Asiacrypt 2003
- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme
- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast
- Security Analysis of Password-Authenticated Key Agreement Protocols
- Intrusion Detection and Viruses
- An Immune-Based Model for Computer Virus Detection
- A New Model for Dynamic Intrusion Detection
- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection
- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
- Authentication and Signature
- ID-Based Aggregate Signatures from Bilinear Pairings
- Efficient Identity-Based Signatures and Blind Signatures
- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures
- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange
- Signcryption
- Two Proxy Signcryption Schemes from Bilinear Pairings
- Constructing Secure Warrant-Based Proxy Signcryption Schemes
- E-mail Security
- Design and Implementation of an Inline Certified E-mail Service
- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery
- Cryptosystems
- Similar Keys of Multivariate Quadratic Public Key Cryptosystems
- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems
- Constructions of Almost Resilient Functions
- Privacy and Tracing
- A Novel Method to Maintain Privacy in Mobile Agent Applications
- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring
- Information Hiding
- Revaluation of Error Correcting Coding in Watermarking Channel
- Firewalls, Denial of Service and DNS Security
- On the Performance and Analysis of DNS Security Extensions
- On Securing RTP-Based Streaming Content with Firewalls
- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling
- Trust Management
- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.