Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings /
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008. The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in top...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2008.
|
Σειρά: | Lecture Notes in Computer Science,
5339 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Cryptosystems
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Hybrid Damgård Is CCA1-Secure under the DDH Assumption
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
- Signatures
- Efficient and Short Certificateless Signature
- Sanitizable Signatures Revisited
- An Efficient On-Line/Off-Line Signature Scheme without Random Oracles
- On the Security of Online/Offline Signatures and Multisignatures from ACISP’06
- Identification, Authentication and Key Management
- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
- Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
- Cryptanalysis of EC-RAC, a RFID Identification Protocol
- Cryptographic Algorithms and Protocols
- Counting Method for Multi-party Computation over Non-abelian Groups
- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
- Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
- Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols
- Skew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based Cryptography
- Stream Ciphers and Block Ciphers
- Cryptanalysis of MV3 Stream Cipher
- 3D: A Three-Dimensional Block Cipher
- Cryptographic Foundations
- Construction of Resilient Functions with Multiple Cryptographic Criteria
- Enumeration of Homogeneous Rotation Symmetric Functions over F p
- Unconditionally Reliable Message Transmission in Directed Hypergraphs
- Applications and Implementations
- An Open Framework for Remote Electronic Elections
- Conditional Payments for Computing Markets
- High-Speed Search System for PGP Passphrases
- Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
- Security in Ad Hoc Networks and Wireless Sensor Networks
- Authenticated Directed Diffusion
- A New Message Recognition Protocol for Ad Hoc Pervasive Networks.