Applied Cryptography and Network Security First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings /

The 1st International Conference on "Applied Cryptography and Network Se- rity" (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte. Ltd. and the Kunming government. It was held in Kunming, China...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Zhou, Jianying (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Yung, Moti (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Han, Yongfei (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2846
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptographic Applications
  • Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case
  • Optimized ? 2-Attack against RC6
  • Anonymity-Enhanced Pseudonym System
  • Intrusion Detection
  • Using Feedback to Improve Masquerade Detection
  • Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services
  • An IP Traceback Scheme Integrating DPM and PPM
  • Cryptographic Algorithms
  • Improved Scalable Hash Chain Traversal
  • Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
  • On the Security of Two Threshold Signature Schemes with Traceable Signers
  • Digital Signature
  • Proxy and Threshold One-Time Signatures
  • A Threshold GQ Signature Scheme
  • Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
  • A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
  • Security Modelling
  • Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems
  • An Authorization Model for E-consent Requirement in a Health Care Application
  • PLI: A New Framework to Protect Digital Content for P2P Networks
  • Web Security
  • Improved Algebraic Traitor Tracing Scheme
  • Common Vulnerability Markup Language
  • Trust on Web Browser: Attack vs. Defense
  • Security Protocols
  • Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
  • Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party
  • Using OCSP to Secure Certificate-Using Transactions in M-commerce
  • Cryptanalysis
  • Differential Fault Analysis on A.E.S
  • Side-Channel Attack on Substitution Blocks
  • Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation
  • A Fast Correlation Attack for LFSR-Based Stream Ciphers
  • Key Management
  • Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient
  • An Efficient Tree-Based Group Key Agreement Using Bilinear Map
  • A Key Recovery Mechanism for Reliable Group Key Management
  • Efficient Implementations
  • Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model
  • Efficient Distributed Signcryption Scheme as Group Signcryption
  • Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.