Jonathan Katz, Philip MacKenzie, Gelareh Taban (auth.), John Ioannidis, Angelos Keromytis, Moti Yung (eds.)3540262237, 9783540262237
Table of contents :
Front Matter….Pages –
Two-Server Password-Only Authenticated Key Exchange….Pages 1-16
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks….Pages 17-32
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme….Pages 33-39
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution….Pages 40-55
A Traitor Tracing Scheme Based on RSA for Fast Decryption….Pages 56-74
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords….Pages 75-90
Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records….Pages 91-103
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management….Pages 104-121
Searching for High-Value Rare Events with Uncheatable Grid Computing….Pages 122-137
Digital Signatures Do Not Guarantee Exclusive Ownership….Pages 138-150
Thompson’s Group and Public Key Cryptography….Pages 151-163
Rainbow, a New Multivariable Polynomial Signature Scheme….Pages 164-175
Badger – A Fast and Provably Secure MAC….Pages 176-191
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns….Pages 192-205
Indexing Information for Data Forensics….Pages 206-221
Model Generalization and Its Implications on Intrusion Detection….Pages 222-237
Intrusion-Resilient Secure Channels….Pages 238-253
Optimal Asymmetric Encryption and Signature Paddings….Pages 254-268
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA….Pages 269-284
Identity Based Encryption Without Redundancy….Pages 285-300
OACerts: Oblivious Attribute Certificates….Pages 301-317
Dynamic k -Times Anonymous Authentication….Pages 318-333
Efficient Anonymous Roaming and Its Security Analysis….Pages 334-349
Quantifying Security in Hybrid Cellular Networks….Pages 350-363
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications….Pages 364-377
Building Reliable Mix Networks with Fair Exchange….Pages 378-392
SCARE of the DES….Pages 393-406
Robust Key Extraction from Physical Uncloneable Functions….Pages 407-422
Efficient Constructions for One-Way Hash Chains….Pages 423-441
Privacy Preserving Keyword Searches on Remote Encrypted Data….Pages 442-455
An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption….Pages 456-466
Non-interactive Zero-Knowledge Arguments for Voting….Pages 467-482
Short Signature and Universal Designated Verifier Signature Without Random Oracles….Pages 483-498
Efficient Identity Based Ring Signature….Pages 499-512
New Signature Schemes with Coupons and Tight Reduction….Pages 513-528
Back Matter….Pages –
Reviews
There are no reviews yet.