Feng Bao (Volume ed.) / San Ling / Huaxiong Wang / Chaoping Xing
Cryptology and Network Security
6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings
Herausgegeben:Bao, Feng; Ling, San; Okamoto, Tatsuaki; Wang, Huaxiong; Xing, Chaoping
2 Angebote ab € 5,80 €
Feng Bao (Volume ed.) / San Ling / Huaxiong Wang / Chaoping Xing
Cryptology and Network Security
6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings
Herausgegeben:Bao, Feng; Ling, San; Okamoto, Tatsuaki; Wang, Huaxiong; Xing, Chaoping
- Broschiertes Buch
Andere Kunden interessierten sich auch für
Produktdetails
- Lecture Notes in Computer Science 4856
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-76968-2
- Seitenzahl: 286
- Englisch
- Abmessung: 241mm x 175mm x 17mm
- Gewicht: 472g
- ISBN-13: 9783540769682
- ISBN-10: 3540769684
- Artikelnr.: 23303651
Signatures.- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.- A Generic Construction for Universally-Convertible Undeniable Signatures.- Fast Digital Signature Algorithm Based on Subgraph Isomorphism.- Efficient ID-Based Digital Signatures with Message Recovery.- Network Security.- Achieving Mobility and Anonymity in IP-Based Networks.- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.- Forward-Secure Key Evolution in Wireless Sensor Networks.- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations.- An Intelligent Network-Warning Model with Strong Survivability.- Running on Karma - P2P Reputation and Currency Systems.- Secure Keyword Search and Private Information Retrieval.- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.- Extended Private Information Retrieval and Its Application in Biometrics Authentications.- Public Key Encryption.- Strongly Secure Certificateless Public Key Encryption Without Pairing.- Intrusion Detection.- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems.- Email Security.- How to Secure Your Email Address Book and Beyond.- Denial of Service Attacks.- Toward Non-parallelizable Client Puzzles.- Authentication.- Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
Signatures.- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.- A Generic Construction for Universally-Convertible Undeniable Signatures.- Fast Digital Signature Algorithm Based on Subgraph Isomorphism.- Efficient ID-Based Digital Signatures with Message Recovery.- Network Security.- Achieving Mobility and Anonymity in IP-Based Networks.- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.- Forward-Secure Key Evolution in Wireless Sensor Networks.- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations.- An Intelligent Network-Warning Model with Strong Survivability.- Running on Karma - P2P Reputation and Currency Systems.- Secure Keyword Search and Private Information Retrieval.- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.- Extended Private Information Retrieval and Its Application in Biometrics Authentications.- Public Key Encryption.- Strongly Secure Certificateless Public Key Encryption Without Pairing.- Intrusion Detection.- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems.- Email Security.- How to Secure Your Email Address Book and Beyond.- Denial of Service Attacks.- Toward Non-parallelizable Client Puzzles.- Authentication.- Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.