Applied cryptography and network security [electronic resource] : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings / John Ioannidis, Angelos Keromytis, Moti Yung (eds.)
"The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Communi-cations and Information Security Association). It was held at Columbia University in New York, USA, J une 7-10, 2005."
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , |
Other title: | ACNS 2005. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
2005.
|
Series: | Lecture notes in computer science ;
3531. |
Subjects: |
Table of Contents:
- Two-server password-only authenticated key exchange / Jonathan Katz
- Strengthening password-based authentication protocols against online dictionary attacks / Peng Wang, Yongdae Kim, Vishal Kher
- Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme / Raphael C.-W. Phan and Bok-Min Goi
- Efficient security mechanisms for overlay multicast-based content distribution / Sencun Zhu, Chao Yao, Donggang Liu
- A traitor tracing scheme based on RSA for fast decryption / John Patrick McGregor, Yiqun Lisa Yin, and Ruby B. Lee
- N-party encrypted diffie-hellman key exchange using different passwords / Jin Wook Byun and Dong Hoon Lee
- Messin' with Texas deriving mother's maiden names using public records / Virgil Griffith and Markus Jakobsson
- Mitigating network denial-of-service through diversity-based traffic management / Ashraf Matrawy, Paul C. van Oorschot, and Anil Somayaji
- Searching for high-value rare events with uncheatable grid computing / Wenliang Du and Michael T. Goodrich
- Digital signatures do not guarantee exclusive ownership / Thomas Pornin and Julien P. Stern
- Thompson's group and public key cryptography / Vladimir Shpilrain and Alexander Ushakov
- Rainbow, a new multivariable polynomial signature scheme / Jintai Ding and Dieter Schmidt
- Badger : a fast and provably secure MAC / Martin Boesgaard, Thomas Christensen, and Erik Zenner
- IDS false alarm reduction using continuous and discontinuous patterns / Abdulrahman Alharby and Hideki Imai
- Indexing information for data forensics / Michael T. Goodrich, Mikhail J. Atallah, and Roberto Tamassia
- Model generalization and its implications on intrusion detection / Zhuowei Li, Amitabha Das, and Jianying Zhou
- Intrusion-resilient secure channels / Gene Itkis, Robert McNerney Jr., and Scott Russell
- Optimal asymmetric encryption and signature paddings Benoit Chevallier-Mames, Duong Hieu Phan, and David Pointcheval
- Efficient and leakage-resilient authenticated key transport protocol based on RSA / SeongHan Shin, Kazukuni Kobara, and Hideki Imi
- Identity based encryptionwithout redundancy / Benoit Libert and Jean-Jacques Quisquater
- OACerts : oblivious attribute certificates / Jiangtao Li and Ninghui Li-- Dynamic k-times anonymous authentication / Lan Nguyen and Rei Safavi-Naini
- Efficient anonymous roaming and its security analysis / Guomin Yang, Duncan S. Wong, and Xiaotie Deng
- Quantifying security in hybrid cellular networks / Markus Jakobsson and Liu Yang
- Off-line karma : a decentralized currency for peer-to-peer and grid applications / Flavio D. Garcia and Jaap-Henk Hoepman
- Building reliable mix networks with fair exchange / Michael K. Reiter, XiaoFeng Wang, and Matthew Wright
- SCARE of the DES (side channel analysis for reverse engineering of the data encryption standard) / Remy Daudigny, Herve Ledi and Frederic Muller
- Robust key extraction from physical uncloneable functions / B. Skoric, P. Tuyls, and W. Ophey
- Efficient constructions for one-way hash chains / Yih-Chun Hu, Markus Jakobsson, and Adrian Perrig
- Privacy preserving keyword searches on remote encrypted data / Yan-Cheng Chang and Michael Mitzenmacher
- An efficient solution to the millionaires' problem based on homomorphic encryption / Hsiao-Ying Lin and Wen-Guey Tzeng
- Non-interactive zero-knowledge arguments for voting / Jens Groth
- Short signature and universal designated verifier signature without random oracles / Rui Zhang, Jun Furukawa, and Hideki Imai
- Efficient identity based ring signature / Sherman S.M. Chow, Siu-Ming Yiu, and Lucas C.K. Hui
- New signature schemes with coupons and tight reduction / Benoit Chevallier-Mames.