Cargando…

Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings /

The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS 2006 brought together individuals from academia and industry involved in multiple research disciplines of cryptography and security to foster exchange of ideas. This v...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Zhou, Jianying (Editor ), Yung, Moti (Editor ), Bao, Feng (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 3989
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Intrusion Avoidance and Detection
  • Adaptive Detection of Local Scanners
  • Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection
  • DSO: Dependable Signing Overlay
  • Cryptographic Applications
  • Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
  • A Handy Multi-coupon System
  • An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
  • DoS: Attacks and Countermeasures
  • Efficient Memory Bound Puzzles Using Pattern Databases
  • Effect of Malicious Synchronization
  • Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
  • Key Management
  • Password Based Server Aided Key Exchange
  • Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks
  • Stateful Subset Cover
  • Cryptanalysis
  • The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions
  • Breaking a New Instance of TTM Cryptosystems
  • Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
  • Security of Limited Devices
  • An AES Smart Card Implementation Resistant to Power Analysis Attacks
  • Physical Security Bounds Against Tampering
  • Flexible Exponentiation with Resistance to Side Channel Attacks
  • Cryptography
  • An Improved Poly1305 MAC
  • Certificateless Public-Key Signature: Security Model and Efficient Construction
  • High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
  • Authentication and Web Security
  • Authentication for Paranoids: Multi-party Secret Handshakes
  • On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan
  • W3Bcrypt: Encryption as a Stylesheet
  • Ad Hoc and Sensor Network Security
  • Combinatorial Structures for Design of Wireless Sensor Networks
  • Public Key Cryptography Sans Certificates in Ad Hoc Networks
  • Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks
  • Cryptographic Constructions
  • A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography
  • Results on Almost Resilient Functions
  • Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
  • Security and Privacy
  • On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
  • Improving the Randomized Initial Point Countermeasure Against DPA
  • Syntax-Driven Private Evaluation of Quantified Membership Queries.