Ahren Studer, Chenxi Wang (auth.), Jianying Zhou, Moti Yung, Feng Bao (eds.)3540347038, 9783540347033
Table of contents :
Front Matter….Pages –
Adaptive Detection of Local Scanners….Pages 1-17
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection….Pages 18-32
DSO: Dependable Signing Overlay….Pages 33-49
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?….Pages 50-65
A Handy Multi-coupon System….Pages 66-81
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families….Pages 82-97
Efficient Memory Bound Puzzles Using Pattern Databases….Pages 98-113
Effect of Malicious Synchronization….Pages 114-129
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets….Pages 130-145
Password Based Server Aided Key Exchange ….Pages 146-161
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks….Pages 162-177
Stateful Subset Cover….Pages 178-193
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions….Pages 194-209
Breaking a New Instance of TTM Cryptosystems….Pages 210-225
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords….Pages 226-238
An AES Smart Card Implementation Resistant to Power Analysis Attacks….Pages 239-252
Physical Security Bounds Against Tampering….Pages 253-267
Flexible Exponentiation with Resistance to Side Channel Attacks….Pages 268-283
An Improved Poly1305 MAC….Pages 284-292
Certificateless Public-Key Signature: Security Model and Efficient Construction….Pages 293-308
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive….Pages 309-324
Authentication for Paranoids: Multi-party Secret Handshakes….Pages 325-339
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan….Pages 340-348
W3Bcrypt: Encryption as a Stylesheet….Pages 349-364
Combinatorial Structures for Design of Wireless Sensor Networks….Pages 365-374
Public Key Cryptography Sans Certificates in Ad Hoc Networks….Pages 375-389
Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks….Pages 390-404
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography….Pages 405-420
Results on Almost Resilient Functions….Pages 421-432
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing….Pages 433-447
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries….Pages 448-458
Improving the Randomized Initial Point Countermeasure Against DPA….Pages 459-469
Syntax-Driven Private Evaluation of Quantified Membership Queries….Pages 470-485
Back Matter….Pages –
Reviews
There are no reviews yet.