Jonathan Katz / Moti Yung5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
Applied Cryptography and Network Security
5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
Herausgegeben:Katz, Jonathan; Yung, Moti
Jonathan Katz / Moti Yung5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
Applied Cryptography and Network Security
5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
Herausgegeben:Katz, Jonathan; Yung, Moti
- Broschiertes Buch
Andere Kunden interessierten sich auch für
- Jianying Zhou / Moti Yung / Feng Bao (eds.)Applied Cryptography and Network Security83,99 €
- Steven M. Bellovin / Rosario Gennaro / Angelos Keromytis / Moti Yung (eds.)Applied Cryptography and Network Security37,99 €
- John Ioannidis / Angelos Keromytis / Moti Yung (eds.)Applied Cryptography and Network Security83,99 €
- Christof PaarUnderstanding Cryptography70,99 €
- Serge Vaudenay (ed.)Public Key Cryptography - PKC 200543,99 €
- Nigel Smart (ed.)Cryptography and Coding42,99 €
- Information Security and Privacy37,99 €
-
-
-
Produktdetails
- Lecture Notes in Computer Science 4521
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-72737-8
- Seitenzahl: 502
- Englisch
- Abmessung: 28mm x 155mm x 235mm
- Gewicht: 721g
- ISBN-13: 9783540727378
- ISBN-10: 354072737X
- Artikelnr.: 22917186
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Jonathan Katz, University of Maryland, College Park, MD, USA / Moti Yung, Columbia University, New York, NY, USA
Signature Schemes I.- Generic Transformation to Strongly Unforgeable Signatures.- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.- Merkle Signatures with Virtually Unlimited Signature Capacity.- Computer and Network Security.- Midpoints Versus Endpoints: From Protocols to Firewalls.- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.- Cryptanalysis.- Cryptanalysis of the TRMC-4 Public Key Cryptosystem.- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.- A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA.- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.- Group-Oriented Security.- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.- Bayesian Methods for Practical Traitor Tracing.- Cryptographic Protocols.- A New Protocol for Conditional Disclosure of Secrets and Its Applications.- An Unconditionally Secure Protocol for Multi-Party Set Intersection.- Privacy-Preserving Set Union.- Anonymous Authentication.- Universal Accumulators with Efficient Nonmembership Proofs.- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.- Identity-Based Cryptography.- Identity-Based Proxy Re-encryption.- A More Natural Way to Construct Identity-Based Identification Schemes.- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions.- Certified E-Mail Protocol in the ID-Based Setting.- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks.- Efficient Content Authentication in Peer-to-Peer Networks.- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.- BAP: Broadcast Authentication Using Cryptographic Puzzles.- Efficient Implementation.- Compressed XTR.- Sliding Window Method for NTRU.- Signature Schemes II.- Efficient Certificateless Signature Schemes.- Security Mediated Certificateless Signatures.- Gradually Convertible Undeniable Signatures.
Signature Schemes I.- Generic Transformation to Strongly Unforgeable Signatures.- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.- Merkle Signatures with Virtually Unlimited Signature Capacity.- Computer and Network Security.- Midpoints Versus Endpoints: From Protocols to Firewalls.- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.- Cryptanalysis.- Cryptanalysis of the TRMC-4 Public Key Cryptosystem.- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.- A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA.- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.- Group-Oriented Security.- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.- Bayesian Methods for Practical Traitor Tracing.- Cryptographic Protocols.- A New Protocol for Conditional Disclosure of Secrets and Its Applications.- An Unconditionally Secure Protocol for Multi-Party Set Intersection.- Privacy-Preserving Set Union.- Anonymous Authentication.- Universal Accumulators with Efficient Nonmembership Proofs.- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.- Identity-Based Cryptography.- Identity-Based Proxy Re-encryption.- A More Natural Way to Construct Identity-Based Identification Schemes.- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions.- Certified E-Mail Protocol in the ID-Based Setting.- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks.- Efficient Content Authentication in Peer-to-Peer Networks.- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.- BAP: Broadcast Authentication Using Cryptographic Puzzles.- Efficient Implementation.- Compressed XTR.- Sliding Window Method for NTRU.- Signature Schemes II.- Efficient Certificateless Signature Schemes.- Security Mediated Certificateless Signatures.- Gradually Convertible Undeniable Signatures.