Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings /

The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Heng, Swee-Huay (Επιμελητής έκδοσης), Wright, Rebecca N. (Επιμελητής έκδοσης), Goi, Bok-Min (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6467
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Block Ciphers
  • Cryptanalysis of Reduced-Round MIBS Block Cipher
  • Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds
  • An Algorithm Based Concurrent Error Detection Scheme for AES
  • Invited Talk I
  • Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)
  • Wireless Network Security
  • Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices
  • A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP
  • User Tracking Based on Behavioral Fingerprints
  • Hash Functions
  • On the Collision and Preimage Resistance of Certain Two-Call Hash Functions
  • Integral Distinguishers of Some SHA-3 Candidates
  • Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
  • Public Key Cryptography
  • Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
  • Generating Parameters for Algebraic Torus-Based Cryptosystems
  • Analysis of the MQQ Public Key Cryptosystem
  • Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations
  • Invited Talk II
  • Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk)
  • Secure Mechanisms
  • Towards a Cryptographic Treatment of Publish/Subscribe Systems
  • STE3D-CAP: Stereoscopic 3D CAPTCHA
  • TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism
  • Cryptographic Protocols
  • Dynamic Group Key Exchange Revisited
  • Towards Practical and Secure Coercion-Resistant Electronic Elections
  • Anonymous Credentials
  • Predicate Encryption with Partial Public Keys
  • Anonymous Credential Schemes with Encrypted Attributes
  • One Time Anonymous Certificate: X.509 Supporting Anonymity.