Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings /

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008. The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in top...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Franklin, Matthew K. (Επιμελητής έκδοσης), Hui, Lucas Chi Kwong (Επιμελητής έκδοσης), Wong, Duncan S. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Σειρά:Lecture Notes in Computer Science, 5339
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptosystems
  • Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
  • Hybrid Damgård Is CCA1-Secure under the DDH Assumption
  • Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
  • Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
  • Signatures
  • Efficient and Short Certificateless Signature
  • Sanitizable Signatures Revisited
  • An Efficient On-Line/Off-Line Signature Scheme without Random Oracles
  • On the Security of Online/Offline Signatures and Multisignatures from ACISP’06
  • Identification, Authentication and Key Management
  • A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
  • Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
  • Cryptanalysis of EC-RAC, a RFID Identification Protocol
  • Cryptographic Algorithms and Protocols
  • Counting Method for Multi-party Computation over Non-abelian Groups
  • Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
  • Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
  • Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols
  • Skew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based Cryptography
  • Stream Ciphers and Block Ciphers
  • Cryptanalysis of MV3 Stream Cipher
  • 3D: A Three-Dimensional Block Cipher
  • Cryptographic Foundations
  • Construction of Resilient Functions with Multiple Cryptographic Criteria
  • Enumeration of Homogeneous Rotation Symmetric Functions over F p
  • Unconditionally Reliable Message Transmission in Directed Hypergraphs
  • Applications and Implementations
  • An Open Framework for Remote Electronic Elections
  • Conditional Payments for Computing Markets
  • High-Speed Search System for PGP Passphrases
  • Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
  • Security in Ad Hoc Networks and Wireless Sensor Networks
  • Authenticated Directed Diffusion
  • A New Message Recognition Protocol for Ad Hoc Pervasive Networks.