HOME > Detail View

Detail View

Applied cryptography and network security : first international conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings

Applied cryptography and network security : first international conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings

Material type
단행본
Personal Author
Zhou, Jianying. Yung, Moti. Han, Yongfei.
Title Statement
Applied cryptography and network security : first international conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings / Jianying Zhou, Moti Yung, Yongfei Han, eds.
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2003.  
Physical Medium
xi, 436 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 2846
ISBN
3540202080 (pbk. : alk. paper) 9783540202080 (pbk. : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Telecommunication -- Security measures -- Congresses. Data encryption (Computer science) -- Congresses. Cryptography -- Congresses.
000 01557camuu2200385 a 4500
001 000001099092
005 20091120145414
008 030925s2003 gw a b 101 0 eng
010 ▼a 2003058695
020 ▼a 3540202080 (pbk. : alk. paper)
020 ▼a 9783540202080 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm53170455
035 ▼a (OCoLC)53170455
035 ▼a (KERIS)REF000009756640
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a TK5102.94 ▼b .A28 2003
082 0 0 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b A184a ▼c 2003
111 2 ▼a ACNS 2003 ▼d (2003 : ▼c Kunming Shi, China)
245 1 0 ▼a Applied cryptography and network security : ▼b first international conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings / ▼c Jianying Zhou, Moti Yung, Yongfei Han, eds.
246 3 0 ▼a ACNS 2003
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2003.
300 ▼a xi, 436 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2846
504 ▼a Includes bibliographical references and index.
650 0 ▼a Telecommunication ▼x Security measures ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Zhou, Jianying.
700 1 ▼a Yung, Moti.
700 1 ▼a Han, Yongfei.
830 0 ▼a Lecture notes in computer science ; ▼v 2846.

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 A184a 2003 Accession No. 121186543 Availability Available Due Date Make a Reservation Service B M
No. 2 Location Sejong Academic Information Center/Science & Technology/ Call Number 005.82 A184a 2003 Accession No. 151158205 Availability Available Due Date Make a Reservation Service
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 A184a 2003 Accession No. 121186543 Availability Available Due Date Make a Reservation Service B M
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Sejong Academic Information Center/Science & Technology/ Call Number 005.82 A184a 2003 Accession No. 151158205 Availability Available Due Date Make a Reservation Service

Contents information

Table of Contents

Cryptographic Applications.- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.- Optimized ? 2-Attack against RC6.- Anonymity-Enhanced Pseudonym System.- Intrusion Detection.- Using Feedback to Improve Masquerade Detection.- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.- An IP Traceback Scheme Integrating DPM and PPM.- Cryptographic Algorithms.- Improved Scalable Hash Chain Traversal.- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.- On the Security of Two Threshold Signature Schemes with Traceable Signers.- Digital Signature.- Proxy and Threshold One-Time Signatures.- A Threshold GQ Signature Scheme.- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary.- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.- Security Modelling.- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.- An Authorization Model for E-consent Requirement in a Health Care Application.- PLI: A New Framework to Protect Digital Content for P2P Networks.- Web Security.- Improved Algebraic Traitor Tracing Scheme.- Common Vulnerability Markup Language.- Trust on Web Browser: Attack vs. Defense.- Security Protocols.- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.- Using OCSP to Secure Certificate-Using Transactions in M-commerce.- Cryptanalysis.- Differential Fault Analysis on A.E.S.- Side-Channel Attack on Substitution Blocks.- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.- A Fast Correlation Attack for LFSR-Based Stream Ciphers.- Key Management.- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.- An Efficient Tree-Based Group Key Agreement Using Bilinear Map.- A Key Recovery Mechanism for Reliable Group Key Management.- Efficient Implementations.- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.- Efficient Distributed Signcryption Scheme as Group Signcryption.- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.


Information Provided By: : Aladin

New Arrivals Books in Related Fields