000 06503nam a22006495i 4500
001 978-3-540-34704-0
003 DE-He213
005 20240730201727.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 _a9783540347040
_9978-3-540-34704-0
024 7 _a10.1007/11767480
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aApplied Cryptography and Network Security
_h[electronic resource] :
_b4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings /
_cedited by Jianying Zhou, Moti Yung, Feng Bao.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXIV, 490 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v3989
505 0 _aIntrusion Avoidance and Detection -- Adaptive Detection of Local Scanners -- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection -- DSO: Dependable Signing Overlay -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy Multi-coupon System -- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families -- DoS: Attacks and Countermeasures -- Efficient Memory Bound Puzzles Using Pattern Databases -- Effect of Malicious Synchronization -- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets -- Key Management -- Password Based Server Aided Key Exchange -- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks -- Stateful Subset Cover -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New Instance of TTM Cryptosystems -- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks -- Physical Security Bounds Against Tampering -- Flexible Exponentiation with Resistance to Side Channel Attacks -- Cryptography -- An Improved Poly1305 MAC -- Certificateless Public-Key Signature: Security Model and Efficient Construction -- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive -- Authentication and Web Security -- Authentication for Paranoids: Multi-party Secret Handshakes -- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan -- W3Bcrypt: Encryption as a Stylesheet -- Ad Hoc and Sensor Network Security -- Combinatorial Structures for Design of Wireless Sensor Networks -- Public Key Cryptography Sans Certificates in Ad Hoc Networks -- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks -- Cryptographic Constructions -- A GeneralMethodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography -- Results on Almost Resilient Functions -- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing -- Security and Privacy -- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries -- Improving the Randomized Initial Point Countermeasure Against DPA -- Syntax-Driven Private Evaluation of Quantified Membership Queries.
520 _aThe 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS 2006 brought together individuals from academia and industry involved in multiple research disciplines of cryptography and security to foster exchange of ideas. This volume (LNCS 3989) contains papers presented in the academic track. ACNS was set a high standard when it was initiated in 2003. There has been a steady improvement in the quality of its program in the past 4 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore). The average acc- tance rate is kept at around 16%. We wish to receive the continued support from the community of cryptographyand security worldwide to further improve its quality and make ACNS one of the leading conferences. The Program Committee of ACNS 2006 received a total of 218 submissions fromallovertheworld,ofwhich33wereselectedforpresentationattheacademic track. In addition to this track, the conference also hosted an industrial track of presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas. We are indebted to our Program Committee members and the external reviewers for the great job they have performed. The proceedings contain revised versions of the accepted papers. However, revisions were not checked and the authors bear full responsibility for the content of their papers.
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aOperating systems (Computers).
_95329
650 0 _aApplication software.
_9168471
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9168472
650 1 4 _aComputer Communication Networks.
_9168473
650 2 4 _aCryptology.
_931769
650 2 4 _aOperating Systems.
_937074
650 2 4 _aComputer and Information Systems Applications.
_9168474
650 2 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
700 1 _aZhou, Jianying.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168475
700 1 _aYung, Moti.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168476
700 1 _aBao, Feng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168477
710 2 _aSpringerLink (Online service)
_9168478
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540347033
776 0 8 _iPrinted edition:
_z9783540825043
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v3989
_9168479
856 4 0 _uhttps://doi.org/10.1007/11767480
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96680
_d96680