Sold Out
Book Categories |
On the Effectiveness of Internal Patching Against File-Sharing Worms Liang Xie Liang, Xie Hui Song Hui, Song Suncun Zhu Zhu, Suncun 1
Peeking Through the Cloud: DNS-Based Estimation and Its Applications Moheeb Abu Rajab Rajab, Moheeb Abu Fabian Monrose Monrose, Fabian Andreas Terzis Terzis, Andreas Niels Proves Proves, Niels 21
Pushback for Overlay Networks: Protecting Against Malicious Insiders Angelos Stavrou Stavrou, Angelos Michael E. Locasto Locasto, Michael E. Angelos D. Keromytis Keromytis, Angelos D. 39
PPAA: Peer-to-Peer Anonymous Authentication Patrick P. Tsang Tsang, Patrick P. Sean W. Smith Smith, Sean W. 55
Generic Constructions of Stateful Public Key Encryption and Their Applications Joonsang Baek Baek, Joonsang Jianying Zhou Zhou, Jianying Feng Bao Feng, Bao 75
Traceable and Retrievable Identity-Based Encryption Man Ho Au Man, Ho Au Qiong Huang Huang, Qiong Joseph K. Liu Liu, Joseph K. Willy Susilo Susilo, Willy Duncan S. Wong Wong, Duncan S. Guomin Yang Yang, Guomin 94
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures Takashi Nishide Nishide, Takashi Kazuki Yoneyama Yoneyama, Kazuki Kazuo Ohta Ohta, Kazuo 111
Attacking Reduced Round SHA-256 Somitra Kumar Sanadhya Sanadhya, Somitra Kumar Palash Sarkcr Sarkcr, Palash 130
DAKOTA - Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography Ivan B. Damgard Damgard, Ivan B. Lars R. Knudsen Knudsen, Lars R. Soren S. Thomsen Thomsen, Soren S. 144
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? Yevgeniy Dodis Dodis, Yevgeniy Prashant Puniya Puniya, Prashant 156
Replay Attack in a Fair Exchange Protocol MaciaMut-Puiqserver Mut-Puiqserver, Macia Magdalena Payeras-Capella Payeras-Capella, Magdalena Josep Lluis Ferrer-Gomila Ferrer-Gomila, Josep Lluis Llorenc Huguet-Rotger Huguet-Rotger, Llorenc 174
Improved Conditional E-Payments Marina Blanton Blanton, Marina 188
Anonymity in Transferable E-cash Sebastien Canard Canard, Sebastien Aline Gouget Gouget, Aline 207
Generic Security-Amplifying Methods of Ordinary Digital Signatures Jin Li Jin, Li Kwangjo Kim Kim, Kwangjo Fangguo Zhang Zhang, Fangguo Duncan So Wong Wong, Duncan So 224
New Differential-Algebraic Attacks and Reparametrization of Rainbow Jintai Ding Ding, Jintai Bo-Yin Yang Yang, Bo-Yin Chia-Hsin Owen Chen Chen, Chia-Hsin Owen Ming-Shing Chen Chen, Ming-Shing Chen-Mou Cheng Cheng, Chen-Mou 242
Trapdoor Sanitizable Signatures and Their Application to Content Protection Sebastien Canard Canard, Sebastien Fabien Laguillaumie Laguillaumie, Fabien Michel Milhau Milhau, Michel 258
Multi-factor Authenticated Key Exchange David Pointcheval Pointcheval, David Sebastien Zimmer Zimmer, Sebastien 277
Repelling Detour Attack Against Onions with Re-encryption Marek Klonowski Klonowski, Marek Miroslaw Kutylowski Kutylowski, Miroslaw Anna Lauks Lauks, Anna 296
Analysis of EAP-GPSK Authentication Protocol John C. Mitchell Mitchell, John C. Arnab Roy Roy, Arnab Paul Rowe Rowe, Paul Andre Scedrov Scedrov, Andre 309
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns Ramnath Prasad Prasad, Ramnath Nitesh Saxena Saxena, Nitesh 328
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol Ghaith Hammouri Hammouri, Ghaith Berk Sunar Sunar, Berk 346
An Authentication Scheme Based on the Twisted Conjugacy Problem Vladimir Shpilrain Shpilrain, Vladimir Alexander Ushakov Ushakov, Alexander 366
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance Nikita Borisov Borisov, Nikita Soumyadeb Mitra Mitra, Soumyadeb 373
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation Tong-Lee Lim Lim, Tong-Lee A. Lakshminarayanan Lakshminarayanan, A. Vim Saksen Saksen, Vim 392
On the Security of the CCM Encryption Mode and of a Slight Variant Pierre-Aloin Fouque Fouque, Pierre-Aloin Gwenaelle Martinet Martinet, Gwenaelle Frederic Valette Valette, Frederic Sebastien Zimmer Zimmer, Sebastien 411
wN AF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm Brian King King, Brian 429
A Very Compact "Perfectly Masked" S-Box for AES D. Ganright Ganright, D. Lejla Batina Batina, Lejla 446
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks Prank Stajano Stajano, Prank Dan Cvrcek Cvrcek, Dan Matt Lewis Lewis, Matt 460
Traceable Privacy of Recent Provably-Secure RFID Protocols Khaled Ouafi Ouafi, Khaled Raphael C.-W. Phan Phan, Raphael C.-W. 479
The Security of EPC Gen2 Compliant RFID Protocols Mike Burmester Burmester, Mike Breno de Medeiros de Medeiros, Breno 490
Author Index 507
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionApplied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings
X
This Item is in Your InventoryApplied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings
X
You must be logged in to review the productsX
X
X
Add Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings, This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and select, Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings to the inventory that you are selling on WonderClubX
X
Add Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings, This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and select, Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings to your collection on WonderClub |