Applied Cryptography and Network Security First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings /
The 1st International Conference on "Applied Cryptography and Network Se- rity" (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte. Ltd. and the Kunming government. It was held in Kunming, China...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
Έκδοση: | 1st ed. 2003. |
Σειρά: | Lecture Notes in Computer Science,
2846 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Cryptographic Applications
- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case
- Optimized ? 2-Attack against RC6
- Anonymity-Enhanced Pseudonym System
- Intrusion Detection
- Using Feedback to Improve Masquerade Detection
- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services
- An IP Traceback Scheme Integrating DPM and PPM
- Cryptographic Algorithms
- Improved Scalable Hash Chain Traversal
- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
- On the Security of Two Threshold Signature Schemes with Traceable Signers
- Digital Signature
- Proxy and Threshold One-Time Signatures
- A Threshold GQ Signature Scheme
- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
- Security Modelling
- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems
- An Authorization Model for E-consent Requirement in a Health Care Application
- PLI: A New Framework to Protect Digital Content for P2P Networks
- Web Security
- Improved Algebraic Traitor Tracing Scheme
- Common Vulnerability Markup Language
- Trust on Web Browser: Attack vs. Defense
- Security Protocols
- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party
- Using OCSP to Secure Certificate-Using Transactions in M-commerce
- Cryptanalysis
- Differential Fault Analysis on A.E.S
- Side-Channel Attack on Substitution Blocks
- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation
- A Fast Correlation Attack for LFSR-Based Stream Ciphers
- Key Management
- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient
- An Efficient Tree-Based Group Key Agreement Using Bilinear Map
- A Key Recovery Mechanism for Reliable Group Key Management
- Efficient Implementations
- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model
- Efficient Distributed Signcryption Scheme as Group Signcryption
- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.