Limit search to available items
Book Cover
E-book
Author International Conference on Cryptology and Network Security (4th : 2005 : Xiamen, Xiamen Shi, China)

Title Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings / Yvo G. Desmedt [and others] (eds.)
Published Berlin ; New York : Springer, ©2005

Copies

Description 1 online resource (xi, 348 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 3810
Lecture notes in computer science ; 3810. 0302-9743
Contents 880-01 CRYPTANALYSIS -- The second-preimage attack on MD4 / Hongbo Yu [and others] -- On the security of certificateless signature schemes from Asiacrypt 2003 / Xinyi Huang [and others] -- On the security of a group signcryption scheme from distributed signcryption scheme / Haiyong Bao [and others] -- Cryptanalysis of two group key management protocols for secure multicast / Wen Tao Zhu -- Security analysis of password-authenticated key agreement protocols / Kyung-Ah Shim, Seung-Hyun Seo -- INTRUSION DETECTION AND VIRUSES -- An immune-based model for computer virus detection ; A new model for dynamic intrusion detection / Tao Li [and others] -- Self debugging mode for patch-independent nullification of unknown remote process infection / Ruo Ando, Yoshiyasu Takefuji -- A new unsupervised anomaly detection framework for detecting network attacks in real-time / Wei Lu, Issa Traore -- AUTHENTICATION AND SIGNATURE -- ID-based aggregate signatures from bilinear pairings / Jing Xu [and others] -- Efficient identity-based signatures and blind signatures / Zhenjie Huang [and others] -- How to authenticate real time streams using improved online/offline signatures / Chong-zhi Gao, Zheng-an Yao -- New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange / Eun-Jun Yoon, Kee-Young Yoo -- SIGNCRYPTION -- Two proxy signcryption schemes from bilinear pairings / Qin Wang, Zhenfu Cao -- Constructing secure warrant-based proxy signcryption schemes / Yuan Zhou [and others] -- E-MAIL SECURITY -- Design and implementation of an inline certified e-mail service / Stelvio Cimato [and others] -- Efficient identity-based protocol for fair certified e-mail delivery / Zhenfeng Zhang [and others] -- CRYPTOSYSTEMS -- Similar keys of multivariate quadratic public key cryptosystems / Yuh-Hua [and others] -- A note on signed binary window algorithm for elliptic curve cryptosystems / Fanyu Kong, Daxing Li -- Constructions of almost resilient functions / Pin-Hui Ke [and others] -- PRIVACY AND TRACING -- A novel method to maintain privacy in mobile agent applications / Kun Peng [and others] -- Non-expanding transaction specific pseudonymization for IP traffic monitoring / Lasse Øverlier [and others] -- INFORMATION HIDING -- Revaluation of error correcting coding in watermarking channel / Limin Gu [and others] -- FIREWALLS, DENIAL OF SERVICE AND DNS SECURITY -- On the performance and analysis of DNS security extensions / Reza Curtmola [and others] -- On securing RTP-based streaming content with firewalls / Liang Lu [and others] -- Safeguard information infrastructure against DDoS attacks: experiments and modeling / Yang Xiang, Wanlei Zhou -- TRUST MANAGEMENT -- Distributed credential chain discovery in trust-management with parameterized roles / Xian Zhu [and others]
880-01/(3/r CRYPTANALYSIS -- The second-preimage attack on MD4 / Hongbo Yu [and others] -- On the security of certificateless signature schemes from Asiacrypt 2003 / Xinyi Huang [and others] -- On the security of a group signcryption scheme from distributed signcryption scheme / Haiyong Bao [and others] -- Cryptanalysis of two group key management protocols for secure multicast / Wen Tao Zhu -- Security analysis of password-authenticated key agreement protocols / Kyung-Ah Shim, Seung-Hyun Seo -- INTRUSION DETECTION AND VIRUSES -- An immune-based model for computer virus detection ; A new model for dynamic intrusion detection / Tao Li [and others] -- Self debugging mode for patch-independent nullification of unknown remote process infection / Ruo Ando, Yoshiyasu Takefuji -- A new unsupervised anomaly detection framework for detecting network attacks in real-time / Wei Lu, Issa Traore -- AUTHENTICATION AND SIGNATURE -- ID-based aggregate signatures from bilinear pairings / Jing Xu [and others] -- Efficient identity-based signatures and blind signatures / Zhenjie Huang [and others] -- How to authenticate real time streams using improved online/offline signatures / Chong-zhi Gao, Zheng-an Yao -- New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange / Eun-Jun Yoon, Kee-Young Yoo -- SIGNCRYPTION -- Two proxy signcryption schemes from bilinear pairings / Qin Wang, Zhenfu Cao -- Constructing secure warrant-based proxy signcryption schemes / Yuan Zhou [and others] -- E-MAIL SECURITY -- Design and implementation of an inline certified e-mail service / Stelvio Cimato [and others] -- Efficient identity-based protocol for fair certified e-mail delivery / Zhenfeng Zhang [and others] -- CRYPTOSYSTEMS -- Similar keys of multivariate quadratic public key cryptosystems / Yuh-Hua [and others] -- A note on signed binary window algorithm for elliptic curve cryptosystems / Fanyu Kong, Daxing Li -- Constructions of almost resilient functions / Pin-Hui Ke [and others] -- PRIVACY AND TRACING -- A novel method to maintain privacy in mobile agent applications / Kun Peng [and others] -- Non-expanding transaction specific pseudonymization for IP traffic monitoring / Lasse ©بverlier [and others] -- INFORMATION HIDING -- Revaluation of error correcting coding in watermarking channel / Limin Gu [and others] -- FIREWALLS, DENIAL OF SERVICE AND DNS SECURITY -- On the performance and analysis of DNS security extensions / Reza Curtmola [and others] -- On securing RTP-based streaming content with firewalls / Liang Lu [and others] -- Safeguard information infrastructure against DDoS attacks: experiments and modeling / Yang Xiang, Wanlei Zhou -- TRUST MANAGEMENT -- Distributed credential chain discovery in trust-management with parameterized roles / Xian Zhu [and others]
Bibliography Includes bibliographical references and index
Notes English
Print version record
Subject Computer security -- Congresses
Cryptography -- Congresses
Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Cryptography -- Data processing -- Congresses
Computer networks.
Computer Communication Networks
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer security.
Cryptography.
Informatique.
Data encryption (Computer science)
Cryptography -- Data processing.
Computer networks -- Security measures.
Computer networks.
Computer security.
Cryptography.
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Desmedt, Yvo.
ISBN 9783540322986
3540322981
3540308490
9783540308492
Other Titles CANS 2005