Michael E. Locasto, Angelos D. Keromytis (auth.), Markus Jakobsson, Moti Yung, Jianying Zhou (eds.)3540222170, 9783540222170, 9783540248521
Table of contents :
Front Matter….Pages –
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap….Pages 1-15
Private Keyword-Based Push and Pull with Applications to Anonymous Communication….Pages 16-30
Secure Conjunctive Keyword Search over Encrypted Data….Pages 31-45
Evaluating Security of Voting Schemes in the Universal Composability Framework….Pages 46-60
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security….Pages 61-75
On the Security of Cryptosystems with All-or-Nothing Transform….Pages 76-90
Centralized Management of Virtual Security Zones in IP Networks….Pages 91-102
S-RIP: A Secure Distance Vector Routing Protocol….Pages 103-119
A Pay-per-Use DoS Protection Mechanism for the Web….Pages 120-134
Limited Verifier Signature from Bilinear Pairings….Pages 135-148
Deniable Ring Authentication Revisited….Pages 149-163
A Fully-Functional Group Signature Scheme over Only Known-Order Group….Pages 164-179
Some Observations on Zap and Its Applications….Pages 180-193
Security Measurements of Steganographic Systems….Pages 194-204
X 2 Rep: Enhanced Trust Semantics for the XRep Protocol….Pages 205-219
One-Round Protocols for Two-Party Authenticated Key Exchange….Pages 220-232
Password Authenticated Key Exchange Using Quadratic Residues….Pages 233-247
Key Agreement Using Statically Keyed Authenticators….Pages 248-262
Low-Latency Cryptographic Protection for SCADA Communications….Pages 263-277
A Best Practice for Root CA Key Update in PKI….Pages 278-291
SQLrand: Preventing SQL Injection Attacks….Pages 292-302
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem….Pages 303-309
Success Probability in χ 2 -Attacks….Pages 310-325
More Generalized Clock-Controlled Alternating Step Generator….Pages 326-338
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy….Pages 339-354
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model….Pages 355-368
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity….Pages 369-382
Security Analysis of CRT-Based Cryptosystems….Pages 383-397
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits….Pages 398-413
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords….Pages 414-425
Advanced Packet Marking Mechanism with Pushback for IP Traceback….Pages 426-438
A Parallel Intrusion Detection System for High-Speed Networks….Pages 439-451
A Novel Framework for Alert Correlation and Understanding….Pages 452-466
An Improved Algorithm for uP + vQ Using JSF $_{3}^{1}$ ….Pages 467-478
New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF ( p n )….Pages 479-493
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions….Pages 494-508
Back Matter….Pages –
Reviews
There are no reviews yet.