Ventzislav Nikov, Svetla Nikova, Bart Preneel (auth.), Jianying Zhou, Moti Yung, Yongfei Han (eds.)3540202080, 9783540202080
Table of contents :
Front Matter….Pages –
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case….Pages 1-15
Optimized χ 2 -Attack against RC6….Pages 16-32
Anonymity-Enhanced Pseudonym System….Pages 33-47
Using Feedback to Improve Masquerade Detection….Pages 48-62
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services….Pages 63-75
An IP Traceback Scheme Integrating DPM and PPM….Pages 76-85
Improved Scalable Hash Chain Traversal….Pages 86-95
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem….Pages 96-110
On the Security of Two Threshold Signature Schemes with Traceable Signers….Pages 111-122
Proxy and Threshold One-Time Signatures….Pages 123-136
A Threshold GQ Signature Scheme….Pages 137-150
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary….Pages 151-168
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme….Pages 169-175
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems….Pages 176-190
An Authorization Model for E-consent Requirement in a Health Care Application….Pages 191-205
PLI: A New Framework to Protect Digital Content for P2P Networks….Pages 206-216
Improved Algebraic Traitor Tracing Scheme….Pages 217-227
Common Vulnerability Markup Language….Pages 228-240
Trust on Web Browser: Attack vs. Defense….Pages 241-253
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards….Pages 254-264
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party….Pages 265-279
Using OCSP to Secure Certificate-Using Transactions in M-commerce….Pages 280-292
Differential Fault Analysis on A.E.S….Pages 293-306
Side-Channel Attack on Substitution Blocks….Pages 307-318
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation….Pages 319-330
A Fast Correlation Attack for LFSR-Based Stream Ciphers….Pages 331-342
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient….Pages 343-356
An Efficient Tree-Based Group Key Agreement Using Bilinear Map….Pages 357-371
A Key Recovery Mechanism for Reliable Group Key Management….Pages 372-386
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model….Pages 387-402
Efficient Distributed Signcryption Scheme as Group Signcryption….Pages 403-417
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors….Pages 418-434
Back Matter….Pages –
Reviews
There are no reviews yet.