Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings /

The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association). It was held at Columbia University in New York, USA, June 7–10, 2005. This conference proceedings vo...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Ioannidis, John (Επιμελητής έκδοσης), Keromytis, Angelos (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3531
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Two-Server Password-Only Authenticated Key Exchange
  • Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
  • Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme
  • Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution
  • A Traitor Tracing Scheme Based on RSA for Fast Decryption
  • N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
  • Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records
  • Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management
  • Searching for High-Value Rare Events with Uncheatable Grid Computing
  • Digital Signatures Do Not Guarantee Exclusive Ownership
  • Thompson’s Group and Public Key Cryptography
  • Rainbow, a New Multivariable Polynomial Signature Scheme
  • Badger – A Fast and Provably Secure MAC
  • IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
  • Indexing Information for Data Forensics
  • Model Generalization and Its Implications on Intrusion Detection
  • Intrusion-Resilient Secure Channels
  • Optimal Asymmetric Encryption and Signature Paddings
  • Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
  • Identity Based Encryption Without Redundancy
  • OACerts: Oblivious Attribute Certificates
  • Dynamic k-Times Anonymous Authentication
  • Efficient Anonymous Roaming and Its Security Analysis
  • Quantifying Security in Hybrid Cellular Networks
  • Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications
  • Building Reliable Mix Networks with Fair Exchange
  • SCARE of the DES
  • Robust Key Extraction from Physical Uncloneable Functions
  • Efficient Constructions for One-Way Hash Chains
  • Privacy Preserving Keyword Searches on Remote Encrypted Data
  • An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption
  • Non-interactive Zero-Knowledge Arguments for Voting
  • Short Signature and Universal Designated Verifier Signature Without Random Oracles
  • Efficient Identity Based Ring Signature
  • New Signature Schemes with Coupons and Tight Reduction.