+612 9045 4394
 
CHECKOUT
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings - Jianying Zhou

Applied Cryptography and Network Security

First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings

By: Jianying Zhou (Editor), Moti Yung (Editor), Yongfei Han (Editor)

Paperback

Published: 7th October 2003
Ships: 5 to 9 business days
5 to 9 business days
$158.39
or 4 easy payments of $39.60 with Learn more

Other Available Formats (Hide)

  • Paperback View Product Published: 9th June 2010
    $296.25
  • Paperback View Product Published: 30th May 2006
    Ships: 5 to 9 business days
    5 to 9 business days
    $181.29

The 1st International Conference on "Applied Cryptography and Network Se- rity" (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte. Ltd. and the Kunming government. It was held in Kunming, China in - tober 2003. The conference proceedings was published as Volume 2846 of the Lecture Notes in Computer Science (LNCS) series of Springer-Verlag. The conference received 191 submissions, from 24 countries and regions; 32 of these papers were accepted, representing 15 countries and regions (acceptance rate of 16.75%). In this volume you will ?nd the revised versions of the - cepted papers that were presented at the conference. In addition to the main track of presentations of accepted papers, an additional track was held in the conference where presentations of an industrial and technical nature were given. These presentations were also carefully selected from a large set of presentation proposals. This new international conference series is the result of the vision of Dr. Yongfei Han. The conference concentrates on current developments that advance the - eas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works and developments in - dustrial and technical frontiers. We thank Dr. Han for initiating this conference and for serving as its General Chair.

Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Casep. 1
Optimized X[superscript 2]-Attack against RC6p. 16
Anonymity-Enhanced Pseudonym Systemp. 33
Using Feedback to Improve Masquerade Detectionp. 48
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Servicesp. 63
An IP Traceback Scheme Integrating DPM and PPMp. 76
Improved Scalable Hash Chain Traversalp. 86
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problemp. 96
On the Security of Two Threshold Signature Schemes with Traceable Signersp. 111
Proxy and Threshold One-Time Signaturesp. 123
A Threshold GQ Signature Schemep. 137
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversaryp. 151
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Schemep. 169
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systemsp. 176
An Authorization Model for E-consent Requirement in a Health Care Applicationp. 191
PLI: A New Framework to Protect Digital Content for P2P Networksp. 206
Improved Algebraic Traitor Tracing Schemep. 217
Common Vulnerability Markup Languagep. 228
Trust on Web Browser: Attack vs. Defensep. 241
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcardsp. 254
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Partyp. 265
Using OCSP to Secure Certificate-Using Transactions in M-commercep. 280
Differential Fault Analysis on A.E.Sp. 293
Side-Channel Attack on Substitution Blocksp. 307
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiationp. 319
A Fast Correlation Attack for LFSR-Based Stream Ciphersp. 331
Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficientp. 343
An Efficient Tree-Based Group Key Agreement Using Bilinear Mapp. 357
A Key Recovery Mechanism for Reliable Group Key Managementp. 372
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Modelp. 387
Efficient Distributed Signcryption Scheme as Group Signcryptionp. 403
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processorsp. 418
Author Indexp. 435
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540202080
ISBN-10: 3540202080
Series: Lecture Notes in Computer Science
Audience: Tertiary; University or College
Format: Paperback
Language: English
Number Of Pages: 440
Published: 7th October 2003
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.5 x 15.5  x 2.31
Weight (kg): 1.39