Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings

Author:   Jianying Zhou ,  Moti Yung ,  Yongfei Han
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2003 ed.
Volume:   2846
ISBN:  

9783540202080


Pages:   440
Publication Date:   07 October 2003
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.07 Quantity:  
Add to Cart

Share |

Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003.The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications, intrusion detection, cryptographic algorithms, digital signatures, security modeling, Web security, security protocols, cryptanalysis, key management, and efficient implementations.

Full Product Details

Author:   Jianying Zhou ,  Moti Yung ,  Yongfei Han
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2003 ed.
Volume:   2846
Dimensions:   Width: 15.50cm , Height: 2.30cm , Length: 23.50cm
Weight:   1.390kg
ISBN:  

9783540202080


ISBN 10:   3540202080
Pages:   440
Publication Date:   07 October 2003
Audience:   College/higher education ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Cryptographic Applications.- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.- Optimized ? 2-Attack against RC6.- Anonymity-Enhanced Pseudonym System.- Intrusion Detection.- Using Feedback to Improve Masquerade Detection.- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.- An IP Traceback Scheme Integrating DPM and PPM.- Cryptographic Algorithms.- Improved Scalable Hash Chain Traversal.- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.- On the Security of Two Threshold Signature Schemes with Traceable Signers.- Digital Signature.- Proxy and Threshold One-Time Signatures.- A Threshold GQ Signature Scheme.- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary.- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.- Security Modelling.- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.- An Authorization Model for E-consent Requirement in a Health Care Application.- PLI: A New Framework to Protect Digital Content for P2P Networks.- Web Security.- Improved Algebraic Traitor Tracing Scheme.- Common Vulnerability Markup Language.- Trust on Web Browser: Attack vs. Defense.- Security Protocols.- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.- Using OCSP to Secure Certificate-Using Transactions in M-commerce.- Cryptanalysis.- Differential Fault Analysis on A.E.S.- Side-Channel Attack on Substitution Blocks.- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.- A Fast Correlation Attack for LFSR-Based Stream Ciphers.- Key Management.- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.- An Efficient Tree-Based Group Key Agreement Using Bilinear Map.- A Key Recovery Mechanism for Reliable Group Key Management.- Efficient Implementations.- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.- Efficient Distributed Signcryption Scheme as Group Signcryption.- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List