Applied Cryptography and Network Security
7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings
Herausgegeben:Abdalla, Michel; Pointcheval, David; Fouque, Pierre-Alain; Vergnaud, Damien
Applied Cryptography and Network Security
7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings
Herausgegeben:Abdalla, Michel; Pointcheval, David; Fouque, Pierre-Alain; Vergnaud, Damien
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
Andere Kunden interessierten sich auch für
- John Ioannidis / Angelos Keromytis / Moti Yung (eds.)Applied Cryptography and Network Security83,99 €
- Matthew Franklin / Lucas Chi-Kwong Hui / Duncan S. Wong (Volume editor)Cryptology and Network Security37,99 €
- Jonathan Katz / Moti YungApplied Cryptography and Network Security37,99 €
- Refik Molva / Gene Tsudik / Dirk Westhoff (eds.)Security and Privacy in Ad-hoc and Sensor Networks42,99 €
- Information Security and Privacy37,99 €
- Marc Joye / Jean-Jaques Quisquater (eds.)Cryptographic Hardware and Embedded Systems - CHES 200442,99 €
- Jianying Zhou / Moti Yung / Feng Bao (eds.)Applied Cryptography and Network Security83,99 €
-
-
-
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 5536
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-01956-2
- Seitenzahl: 535
- Englisch
- Abmessung: 31mm x 155mm x 233mm
- Gewicht: 842g
- ISBN-13: 9783642019562
- ISBN-10: 3642019560
- Artikelnr.: 26327882
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 5536
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-01956-2
- Seitenzahl: 535
- Englisch
- Abmessung: 31mm x 155mm x 233mm
- Gewicht: 842g
- ISBN-13: 9783642019562
- ISBN-10: 3642019560
- Artikelnr.: 26327882
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Key Exchange.- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol.- Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior.- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.- Secure Computation.- Novel Precomputation Schemes for Elliptic Curve Cryptosystems.- Practical Secure Evaluation of Semi-private Functions.- Secure Hamming Distance Based Computation and Its Applications.- Efficient Robust Private Set Intersection.- Public-Key Encryption.- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.- An Efficient Identity-Based Online/Offline Encryption Scheme.- Dual-Policy Attribute Based Encryption.- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.- Network Security I.- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis.- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.- Traitor Tracing.- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.- Tracing and Revoking Pirate Rebroadcasts.- Authentication and Anonymity.- Efficient Deniable Authentication for Signatures.- Homomorphic MACs: MAC-Based Integrity for Network Coding.- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN.- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks.- Hash Functions.- Cryptanalysis of Twister.- Cryptanalysis of CubeHash.- Collision Attack on Boole.- Network Security II.- Integrity Protection for Revision Control.- Fragility of the Robust Security Network: 802.11 Denial of Service.- Fast Packet Classification Using Condition Factorization.- Lattices.- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.- Broadcast Attacks against Lattice-Based Cryptosystems.- Partial Key Exposure Attack on CRT-RSA.- Side-Channel Attacks.- How to Compare Profiled Side-Channel Attacks?.- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.- Attacking ECDSA-Enabled RFID Devices.
Key Exchange.- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol.- Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior.- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.- Secure Computation.- Novel Precomputation Schemes for Elliptic Curve Cryptosystems.- Practical Secure Evaluation of Semi-private Functions.- Secure Hamming Distance Based Computation and Its Applications.- Efficient Robust Private Set Intersection.- Public-Key Encryption.- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.- An Efficient Identity-Based Online/Offline Encryption Scheme.- Dual-Policy Attribute Based Encryption.- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.- Network Security I.- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis.- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.- Traitor Tracing.- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.- Tracing and Revoking Pirate Rebroadcasts.- Authentication and Anonymity.- Efficient Deniable Authentication for Signatures.- Homomorphic MACs: MAC-Based Integrity for Network Coding.- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN.- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks.- Hash Functions.- Cryptanalysis of Twister.- Cryptanalysis of CubeHash.- Collision Attack on Boole.- Network Security II.- Integrity Protection for Revision Control.- Fragility of the Robust Security Network: 802.11 Denial of Service.- Fast Packet Classification Using Condition Factorization.- Lattices.- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.- Broadcast Attacks against Lattice-Based Cryptosystems.- Partial Key Exposure Attack on CRT-RSA.- Side-Channel Attacks.- How to Compare Profiled Side-Channel Attacks?.- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.- Attacking ECDSA-Enabled RFID Devices.