Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Security and Cryptology ;
4521 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Signature Schemes I
- Generic Transformation to Strongly Unforgeable Signatures
- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
- Merkle Signatures with Virtually Unlimited Signature Capacity
- Computer and Network Security
- Midpoints Versus Endpoints: From Protocols to Firewalls
- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
- Cryptanalysis
- Cryptanalysis of the TRMC-4 Public Key Cryptosystem
- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack
- A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA
- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
- Group-Oriented Security
- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
- Bayesian Methods for Practical Traitor Tracing
- Cryptographic Protocols
- A New Protocol for Conditional Disclosure of Secrets and Its Applications
- An Unconditionally Secure Protocol for Multi-Party Set Intersection
- Privacy-Preserving Set Union
- Anonymous Authentication
- Universal Accumulators with Efficient Nonmembership Proofs
- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
- Identity-Based Cryptography
- Identity-Based Proxy Re-encryption
- A More Natural Way to Construct Identity-Based Identification Schemes
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Certified E-Mail Protocol in the ID-Based Setting
- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks
- Efficient Content Authentication in Peer-to-Peer Networks
- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains
- BAP: Broadcast Authentication Using Cryptographic Puzzles
- Efficient Implementation
- Compressed XTR
- Sliding Window Method for NTRU
- Signature Schemes II
- Efficient Certificateless Signature Schemes
- Security Mediated Certificateless Signatures
- Gradually Convertible Undeniable Signatures.