Cargando…

Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings /

The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Heng, Swee-Huay (Editor ), Wright, Rebecca N. (Editor ), Goi, Bok-Min (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6467
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Block Ciphers
  • Cryptanalysis of Reduced-Round MIBS Block Cipher
  • Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds
  • An Algorithm Based Concurrent Error Detection Scheme for AES
  • Invited Talk I
  • Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)
  • Wireless Network Security
  • Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices
  • A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP
  • User Tracking Based on Behavioral Fingerprints
  • Hash Functions
  • On the Collision and Preimage Resistance of Certain Two-Call Hash Functions
  • Integral Distinguishers of Some SHA-3 Candidates
  • Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
  • Public Key Cryptography
  • Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
  • Generating Parameters for Algebraic Torus-Based Cryptosystems
  • Analysis of the MQQ Public Key Cryptosystem
  • Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations
  • Invited Talk II
  • Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk)
  • Secure Mechanisms
  • Towards a Cryptographic Treatment of Publish/Subscribe Systems
  • STE3D-CAP: Stereoscopic 3D CAPTCHA
  • TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism
  • Cryptographic Protocols
  • Dynamic Group Key Exchange Revisited
  • Towards Practical and Secure Coercion-Resistant Electronic Elections
  • Anonymous Credentials
  • Predicate Encryption with Partial Public Keys
  • Anonymous Credential Schemes with Encrypted Attributes
  • One Time Anonymous Certificate: X.509 Supporting Anonymity.