Cargando…

Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Desmedt, Yvo G. (Editor ), Wang, Huaxiong (Editor ), Mu, Yi (Editor ), Li, Yongqing (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3810
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Cryptanalysis
  • The Second-Preimage Attack on MD4
  • On the Security of Certificateless Signature Schemes from Asiacrypt 2003
  • On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme
  • Cryptanalysis of Two Group Key Management Protocols for Secure Multicast
  • Security Analysis of Password-Authenticated Key Agreement Protocols
  • Intrusion Detection and Viruses
  • An Immune-Based Model for Computer Virus Detection
  • A New Model for Dynamic Intrusion Detection
  • Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection
  • A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
  • Authentication and Signature
  • ID-Based Aggregate Signatures from Bilinear Pairings
  • Efficient Identity-Based Signatures and Blind Signatures
  • How to Authenticate Real Time Streams Using Improved Online/Offline Signatures
  • New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange
  • Signcryption
  • Two Proxy Signcryption Schemes from Bilinear Pairings
  • Constructing Secure Warrant-Based Proxy Signcryption Schemes
  • E-mail Security
  • Design and Implementation of an Inline Certified E-mail Service
  • Efficient Identity-Based Protocol for Fair Certified E-mail Delivery
  • Cryptosystems
  • Similar Keys of Multivariate Quadratic Public Key Cryptosystems
  • A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems
  • Constructions of Almost Resilient Functions
  • Privacy and Tracing
  • A Novel Method to Maintain Privacy in Mobile Agent Applications
  • Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring
  • Information Hiding
  • Revaluation of Error Correcting Coding in Watermarking Channel
  • Firewalls, Denial of Service and DNS Security
  • On the Performance and Analysis of DNS Security Extensions
  • On Securing RTP-Based Streaming Content with Firewalls
  • Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling
  • Trust Management
  • Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.