Wonder Club world wonders pyramid logo
×

Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings Book

Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings
Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings, This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
The 30 revised full papers presented were carefully reviewed and select, Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings has a rating of 3 stars
   2 Ratings
X
Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings, This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and select, Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings
  • Written by author Steven M. Bellovin
  • Published by Springer-Verlag New York, LLC, August 2008
  • This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and select
  • This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.The 30 revised full papers presented were carefully reviewed and selecte
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

On the Effectiveness of Internal Patching Against File-Sharing Worms Liang Xie Liang, Xie Hui Song Hui, Song Suncun Zhu Zhu, Suncun 1

Peeking Through the Cloud: DNS-Based Estimation and Its Applications Moheeb Abu Rajab Rajab, Moheeb Abu Fabian Monrose Monrose, Fabian Andreas Terzis Terzis, Andreas Niels Proves Proves, Niels 21

Pushback for Overlay Networks: Protecting Against Malicious Insiders Angelos Stavrou Stavrou, Angelos Michael E. Locasto Locasto, Michael E. Angelos D. Keromytis Keromytis, Angelos D. 39

PPAA: Peer-to-Peer Anonymous Authentication Patrick P. Tsang Tsang, Patrick P. Sean W. Smith Smith, Sean W. 55

Generic Constructions of Stateful Public Key Encryption and Their Applications Joonsang Baek Baek, Joonsang Jianying Zhou Zhou, Jianying Feng Bao Feng, Bao 75

Traceable and Retrievable Identity-Based Encryption Man Ho Au Man, Ho Au Qiong Huang Huang, Qiong Joseph K. Liu Liu, Joseph K. Willy Susilo Susilo, Willy Duncan S. Wong Wong, Duncan S. Guomin Yang Yang, Guomin 94

Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures Takashi Nishide Nishide, Takashi Kazuki Yoneyama Yoneyama, Kazuki Kazuo Ohta Ohta, Kazuo 111

Attacking Reduced Round SHA-256 Somitra Kumar Sanadhya Sanadhya, Somitra Kumar Palash Sarkcr Sarkcr, Palash 130

DAKOTA - Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography Ivan B. Damgard Damgard, Ivan B. Lars R. Knudsen Knudsen, Lars R. Soren S. Thomsen Thomsen, Soren S. 144

Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? Yevgeniy Dodis Dodis, Yevgeniy Prashant Puniya Puniya, Prashant 156

Replay Attack in a Fair Exchange Protocol MaciaMut-Puiqserver Mut-Puiqserver, Macia Magdalena Payeras-Capella Payeras-Capella, Magdalena Josep Lluis Ferrer-Gomila Ferrer-Gomila, Josep Lluis Llorenc Huguet-Rotger Huguet-Rotger, Llorenc 174

Improved Conditional E-Payments Marina Blanton Blanton, Marina 188

Anonymity in Transferable E-cash Sebastien Canard Canard, Sebastien Aline Gouget Gouget, Aline 207

Generic Security-Amplifying Methods of Ordinary Digital Signatures Jin Li Jin, Li Kwangjo Kim Kim, Kwangjo Fangguo Zhang Zhang, Fangguo Duncan So Wong Wong, Duncan So 224

New Differential-Algebraic Attacks and Reparametrization of Rainbow Jintai Ding Ding, Jintai Bo-Yin Yang Yang, Bo-Yin Chia-Hsin Owen Chen Chen, Chia-Hsin Owen Ming-Shing Chen Chen, Ming-Shing Chen-Mou Cheng Cheng, Chen-Mou 242

Trapdoor Sanitizable Signatures and Their Application to Content Protection Sebastien Canard Canard, Sebastien Fabien Laguillaumie Laguillaumie, Fabien Michel Milhau Milhau, Michel 258

Multi-factor Authenticated Key Exchange David Pointcheval Pointcheval, David Sebastien Zimmer Zimmer, Sebastien 277

Repelling Detour Attack Against Onions with Re-encryption Marek Klonowski Klonowski, Marek Miroslaw Kutylowski Kutylowski, Miroslaw Anna Lauks Lauks, Anna 296

Analysis of EAP-GPSK Authentication Protocol John C. Mitchell Mitchell, John C. Arnab Roy Roy, Arnab Paul Rowe Rowe, Paul Andre Scedrov Scedrov, Andre 309

Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns Ramnath Prasad Prasad, Ramnath Nitesh Saxena Saxena, Nitesh 328

PUF-HB: A Tamper-Resilient HB Based Authentication Protocol Ghaith Hammouri Hammouri, Ghaith Berk Sunar Sunar, Berk 346

An Authentication Scheme Based on the Twisted Conjugacy Problem Vladimir Shpilrain Shpilrain, Vladimir Alexander Ushakov Ushakov, Alexander 366

Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance Nikita Borisov Borisov, Nikita Soumyadeb Mitra Mitra, Soumyadeb 373

A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation Tong-Lee Lim Lim, Tong-Lee A. Lakshminarayanan Lakshminarayanan, A. Vim Saksen Saksen, Vim 392

On the Security of the CCM Encryption Mode and of a Slight Variant Pierre-Aloin Fouque Fouque, Pierre-Aloin Gwenaelle Martinet Martinet, Gwenaelle Frederic Valette Valette, Frederic Sebastien Zimmer Zimmer, Sebastien 411

wN AF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm Brian King King, Brian 429

A Very Compact "Perfectly Masked" S-Box for AES D. Ganright Ganright, D. Lejla Batina Batina, Lejla 446

Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks Prank Stajano Stajano, Prank Dan Cvrcek Cvrcek, Dan Matt Lewis Lewis, Matt 460

Traceable Privacy of Recent Provably-Secure RFID Protocols Khaled Ouafi Ouafi, Khaled Raphael C.-W. Phan Phan, Raphael C.-W. 479

The Security of EPC Gen2 Compliant RFID Protocols Mike Burmester Burmester, Mike Breno de Medeiros de Medeiros, Breno 490

Author Index 507


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings, This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
The 30 revised full papers presented were carefully reviewed and select, Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings

X
WonderClub Home

This item is in your Collection

Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings, This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
The 30 revised full papers presented were carefully reviewed and select, Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings

Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings

X
WonderClub Home

This Item is in Your Inventory

Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings, This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
The 30 revised full papers presented were carefully reviewed and select, Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings

Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, NY, USA, June 3-6, 2008, Proceedings

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: