Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings /
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS 2006 brought together individuals from academia and industry involved in multiple research disciplines of cryptography and security to foster exchange of ideas. This v...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
3989 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Intrusion Avoidance and Detection
- Adaptive Detection of Local Scanners
- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection
- DSO: Dependable Signing Overlay
- Cryptographic Applications
- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
- A Handy Multi-coupon System
- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
- DoS: Attacks and Countermeasures
- Efficient Memory Bound Puzzles Using Pattern Databases
- Effect of Malicious Synchronization
- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
- Key Management
- Password Based Server Aided Key Exchange
- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks
- Stateful Subset Cover
- Cryptanalysis
- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions
- Breaking a New Instance of TTM Cryptosystems
- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
- Security of Limited Devices
- An AES Smart Card Implementation Resistant to Power Analysis Attacks
- Physical Security Bounds Against Tampering
- Flexible Exponentiation with Resistance to Side Channel Attacks
- Cryptography
- An Improved Poly1305 MAC
- Certificateless Public-Key Signature: Security Model and Efficient Construction
- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
- Authentication and Web Security
- Authentication for Paranoids: Multi-party Secret Handshakes
- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan
- W3Bcrypt: Encryption as a Stylesheet
- Ad Hoc and Sensor Network Security
- Combinatorial Structures for Design of Wireless Sensor Networks
- Public Key Cryptography Sans Certificates in Ad Hoc Networks
- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks
- Cryptographic Constructions
- A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography
- Results on Almost Resilient Functions
- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
- Security and Privacy
- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
- Improving the Randomized Initial Point Countermeasure Against DPA
- Syntax-Driven Private Evaluation of Quantified Membership Queries.