Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4521

ISBN: 354072737X, 9783540727378

Size: 5 MB (4836753 bytes)

Pages: 502/508

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan Katz, Moti Yung (eds.)354072737X, 9783540727378

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, in June 2007.

The 31 revised full papers presented were carefully reviewed and selected from around 260 submissions. The papers are organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, security in wireless, ad-hoc, and peer-to-peer networks, as well as efficient implementation.


Table of contents :
Front Matter….Pages –
Generic Transformation to Strongly Unforgeable Signatures….Pages 1-17
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure….Pages 18-30
Merkle Signatures with Virtually Unlimited Signature Capacity….Pages 31-45
Midpoints Versus Endpoints: From Protocols to Firewalls….Pages 46-64
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme….Pages 65-86
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus….Pages 87-103
Cryptanalysis of the TRMC-4 Public Key Cryptosystem….Pages 104-115
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack….Pages 116-128
A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA….Pages 129-140
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis….Pages 141-157
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity….Pages 158-176
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme….Pages 177-193
Bayesian Methods for Practical Traitor Tracing….Pages 194-206
A New Protocol for Conditional Disclosure of Secrets and Its Applications….Pages 207-225
An Unconditionally Secure Protocol for Multi-Party Set Intersection….Pages 226-236
Privacy-Preserving Set Union….Pages 237-252
Universal Accumulators with Efficient Nonmembership Proofs….Pages 253-269
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes….Pages 270-287
Identity-Based Proxy Re-encryption….Pages 288-306
A More Natural Way to Construct Identity-Based Identification Schemes….Pages 307-322
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions….Pages 323-339
Certified E-Mail Protocol in the ID-Based Setting….Pages 340-353
Efficient Content Authentication in Peer-to-Peer Networks….Pages 354-372
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks….Pages 373-384
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains….Pages 385-400
BAP: Broadcast Authentication Using Cryptographic Puzzles….Pages 401-419
Compressed XTR….Pages 420-431
Sliding Window Method for NTRU….Pages 432-442
Efficient Certificateless Signature Schemes….Pages 443-458
Security Mediated Certificateless Signatures….Pages 459-477
Gradually Convertible Undeniable Signatures….Pages 478-496
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings”
Shopping Cart
Scroll to Top