HOME > 상세정보

상세정보

Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

자료유형
단행본
개인저자
Ioannidis, John. Keromytis, Angelos. Yung, Moti.
서명 / 저자사항
Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings / John Ioannidis, Angelos Keromytis, Moti Yung (eds.).
발행사항
Berlin ;   New York :   Springer,   c2005.  
형태사항
xi, 530 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 3531
ISBN
3540262237 (pbk. : alk. paper) 9783540262237 (pbk. : alk. paper)
일반주기
Also issued online.
서지주기
Includes bibliographical references and index.
이용가능한 다른형태자료
Also issued online.  
일반주제명
Telecommunication -- Security measures -- Congresses. Data encryption (Computer science) -- Congresses. Cryptography -- Congresses.
000 01874camuu2200445 a 4500
001 000045560894
005 20091126125110
008 050502s2005 gw a b 101 0 eng d
010 ▼a 2005926829
016 7 ▼a 974911976 ▼2 GyFmDB
020 ▼a 3540262237 (pbk. : alk. paper)
020 ▼a 9783540262237 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm60613452
035 ▼a (OCoLC)60613452
035 ▼a (KERIS)REF000012377399
040 ▼a OHX ▼c OHX ▼d CUS ▼d C$Q ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a TK5102.85 ▼b .A26 2005
072 7 ▼a TK ▼2 lcco
082 0 0 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b A184a ▼c 2005
111 2 ▼a ACNS 2005 ▼d (2005 : ▼c New York, N.Y.)
245 1 0 ▼a Applied cryptography and network security : ▼b third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings / ▼c John Ioannidis, Angelos Keromytis, Moti Yung (eds.).
246 3 0 ▼a ACNS 2005
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xi, 530 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3531
504 ▼a Includes bibliographical references and index.
530 ▼a Also issued online.
650 0 ▼a Telecommunication ▼x Security measures ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Ioannidis, John.
700 1 ▼a Keromytis, Angelos.
700 1 ▼a Yung, Moti.
830 0 ▼a Lecture notes in computer science ; ▼v 3531.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 A184a 2005 등록번호 121186546 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Two-Server Password-Only Authenticated Key Exchange.- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.- A Traitor Tracing Scheme Based on RSA for Fast Decryption.- N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.- Messin' with Texas Deriving Mother's Maiden Names Using Public Records.- Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.- Searching for High-Value Rare Events with Uncheatable Grid Computing.- Digital Signatures Do Not Guarantee Exclusive Ownership.- Thompson's Group and Public Key Cryptography.- Rainbow, a New Multivariable Polynomial Signature Scheme.- Badger - A Fast and Provably Secure MAC.- IDS False Alarm Reduction Using Continuous and Discontinuous Patterns.- Indexing Information for Data Forensics.- Model Generalization and Its Implications on Intrusion Detection.- Intrusion-Resilient Secure Channels.- Optimal Asymmetric Encryption and Signature Paddings.- Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.- Identity Based Encryption Without Redundancy.- OACerts: Oblivious Attribute Certificates.- Dynamic k-Times Anonymous Authentication.- Efficient Anonymous Roaming and Its Security Analysis.- Quantifying Security in Hybrid Cellular Networks.- Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications.- Building Reliable Mix Networks with Fair Exchange.- SCARE of the DES.- Robust Key Extraction from Physical Uncloneable Functions.- Efficient Constructions for One-Way Hash Chains.- Privacy Preserving Keyword Searches on Remote Encrypted Data.- An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption.- Non-interactive Zero-Knowledge Arguments for Voting.- Short Signature and Universal Designated Verifier Signature Without Random Oracles.- Efficient Identity Based Ring Signature.- New Signature Schemes with Coupons and Tight Reduction.


정보제공 : Aladin

관련분야 신착자료