Description |
1 online resource (xi, 348 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 3810 |
|
Lecture notes in computer science ; 3810. 0302-9743
|
Contents |
880-01 CRYPTANALYSIS -- The second-preimage attack on MD4 / Hongbo Yu [and others] -- On the security of certificateless signature schemes from Asiacrypt 2003 / Xinyi Huang [and others] -- On the security of a group signcryption scheme from distributed signcryption scheme / Haiyong Bao [and others] -- Cryptanalysis of two group key management protocols for secure multicast / Wen Tao Zhu -- Security analysis of password-authenticated key agreement protocols / Kyung-Ah Shim, Seung-Hyun Seo -- INTRUSION DETECTION AND VIRUSES -- An immune-based model for computer virus detection ; A new model for dynamic intrusion detection / Tao Li [and others] -- Self debugging mode for patch-independent nullification of unknown remote process infection / Ruo Ando, Yoshiyasu Takefuji -- A new unsupervised anomaly detection framework for detecting network attacks in real-time / Wei Lu, Issa Traore -- AUTHENTICATION AND SIGNATURE -- ID-based aggregate signatures from bilinear pairings / Jing Xu [and others] -- Efficient identity-based signatures and blind signatures / Zhenjie Huang [and others] -- How to authenticate real time streams using improved online/offline signatures / Chong-zhi Gao, Zheng-an Yao -- New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange / Eun-Jun Yoon, Kee-Young Yoo -- SIGNCRYPTION -- Two proxy signcryption schemes from bilinear pairings / Qin Wang, Zhenfu Cao -- Constructing secure warrant-based proxy signcryption schemes / Yuan Zhou [and others] -- E-MAIL SECURITY -- Design and implementation of an inline certified e-mail service / Stelvio Cimato [and others] -- Efficient identity-based protocol for fair certified e-mail delivery / Zhenfeng Zhang [and others] -- CRYPTOSYSTEMS -- Similar keys of multivariate quadratic public key cryptosystems / Yuh-Hua [and others] -- A note on signed binary window algorithm for elliptic curve cryptosystems / Fanyu Kong, Daxing Li -- Constructions of almost resilient functions / Pin-Hui Ke [and others] -- PRIVACY AND TRACING -- A novel method to maintain privacy in mobile agent applications / Kun Peng [and others] -- Non-expanding transaction specific pseudonymization for IP traffic monitoring / Lasse Øverlier [and others] -- INFORMATION HIDING -- Revaluation of error correcting coding in watermarking channel / Limin Gu [and others] -- FIREWALLS, DENIAL OF SERVICE AND DNS SECURITY -- On the performance and analysis of DNS security extensions / Reza Curtmola [and others] -- On securing RTP-based streaming content with firewalls / Liang Lu [and others] -- Safeguard information infrastructure against DDoS attacks: experiments and modeling / Yang Xiang, Wanlei Zhou -- TRUST MANAGEMENT -- Distributed credential chain discovery in trust-management with parameterized roles / Xian Zhu [and others] |
|
880-01/(3/r CRYPTANALYSIS -- The second-preimage attack on MD4 / Hongbo Yu [and others] -- On the security of certificateless signature schemes from Asiacrypt 2003 / Xinyi Huang [and others] -- On the security of a group signcryption scheme from distributed signcryption scheme / Haiyong Bao [and others] -- Cryptanalysis of two group key management protocols for secure multicast / Wen Tao Zhu -- Security analysis of password-authenticated key agreement protocols / Kyung-Ah Shim, Seung-Hyun Seo -- INTRUSION DETECTION AND VIRUSES -- An immune-based model for computer virus detection ; A new model for dynamic intrusion detection / Tao Li [and others] -- Self debugging mode for patch-independent nullification of unknown remote process infection / Ruo Ando, Yoshiyasu Takefuji -- A new unsupervised anomaly detection framework for detecting network attacks in real-time / Wei Lu, Issa Traore -- AUTHENTICATION AND SIGNATURE -- ID-based aggregate signatures from bilinear pairings / Jing Xu [and others] -- Efficient identity-based signatures and blind signatures / Zhenjie Huang [and others] -- How to authenticate real time streams using improved online/offline signatures / Chong-zhi Gao, Zheng-an Yao -- New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange / Eun-Jun Yoon, Kee-Young Yoo -- SIGNCRYPTION -- Two proxy signcryption schemes from bilinear pairings / Qin Wang, Zhenfu Cao -- Constructing secure warrant-based proxy signcryption schemes / Yuan Zhou [and others] -- E-MAIL SECURITY -- Design and implementation of an inline certified e-mail service / Stelvio Cimato [and others] -- Efficient identity-based protocol for fair certified e-mail delivery / Zhenfeng Zhang [and others] -- CRYPTOSYSTEMS -- Similar keys of multivariate quadratic public key cryptosystems / Yuh-Hua [and others] -- A note on signed binary window algorithm for elliptic curve cryptosystems / Fanyu Kong, Daxing Li -- Constructions of almost resilient functions / Pin-Hui Ke [and others] -- PRIVACY AND TRACING -- A novel method to maintain privacy in mobile agent applications / Kun Peng [and others] -- Non-expanding transaction specific pseudonymization for IP traffic monitoring / Lasse ©بverlier [and others] -- INFORMATION HIDING -- Revaluation of error correcting coding in watermarking channel / Limin Gu [and others] -- FIREWALLS, DENIAL OF SERVICE AND DNS SECURITY -- On the performance and analysis of DNS security extensions / Reza Curtmola [and others] -- On securing RTP-based streaming content with firewalls / Liang Lu [and others] -- Safeguard information infrastructure against DDoS attacks: experiments and modeling / Yang Xiang, Wanlei Zhou -- TRUST MANAGEMENT -- Distributed credential chain discovery in trust-management with parameterized roles / Xian Zhu [and others] |
Bibliography |
Includes bibliographical references and index |
Notes |
English |
|
Print version record |
Subject |
Computer security -- Congresses
|
|
Cryptography -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Cryptography -- Data processing -- Congresses
|
|
Computer networks.
|
|
Computer Communication Networks
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer security.
|
|
Cryptography.
|
|
Informatique.
|
|
Data encryption (Computer science)
|
|
Cryptography -- Data processing.
|
|
Computer networks -- Security measures.
|
|
Computer networks.
|
|
Computer security.
|
|
Cryptography.
|
Genre/Form |
Conference papers and proceedings.
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Desmedt, Yvo.
|
ISBN |
9783540322986 |
|
3540322981 |
|
3540308490 |
|
9783540308492 |
|