Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Desmedt, Yvo G. (Επιμελητής έκδοσης), Wang, Huaxiong (Επιμελητής έκδοσης), Mu, Yi (Επιμελητής έκδοσης), Li, Yongqing (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3810
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptanalysis
  • The Second-Preimage Attack on MD4
  • On the Security of Certificateless Signature Schemes from Asiacrypt 2003
  • On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme
  • Cryptanalysis of Two Group Key Management Protocols for Secure Multicast
  • Security Analysis of Password-Authenticated Key Agreement Protocols
  • Intrusion Detection and Viruses
  • An Immune-Based Model for Computer Virus Detection
  • A New Model for Dynamic Intrusion Detection
  • Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection
  • A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
  • Authentication and Signature
  • ID-Based Aggregate Signatures from Bilinear Pairings
  • Efficient Identity-Based Signatures and Blind Signatures
  • How to Authenticate Real Time Streams Using Improved Online/Offline Signatures
  • New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange
  • Signcryption
  • Two Proxy Signcryption Schemes from Bilinear Pairings
  • Constructing Secure Warrant-Based Proxy Signcryption Schemes
  • E-mail Security
  • Design and Implementation of an Inline Certified E-mail Service
  • Efficient Identity-Based Protocol for Fair Certified E-mail Delivery
  • Cryptosystems
  • Similar Keys of Multivariate Quadratic Public Key Cryptosystems
  • A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems
  • Constructions of Almost Resilient Functions
  • Privacy and Tracing
  • A Novel Method to Maintain Privacy in Mobile Agent Applications
  • Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring
  • Information Hiding
  • Revaluation of Error Correcting Coding in Watermarking Channel
  • Firewalls, Denial of Service and DNS Security
  • On the Performance and Analysis of DNS Security Extensions
  • On Securing RTP-Based Streaming Content with Firewalls
  • Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling
  • Trust Management
  • Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.