HOME > Detail View

Detail View

Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

Material type
단행본
Personal Author
Ioannidis, John. Keromytis, Angelos. Yung, Moti.
Title Statement
Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings / John Ioannidis, Angelos Keromytis, Moti Yung (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2005.  
Physical Medium
xi, 530 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 3531
ISBN
3540262237 (pbk. : alk. paper) 9783540262237 (pbk. : alk. paper)
General Note
Also issued online.
Bibliography, Etc. Note
Includes bibliographical references and index.
이용가능한 다른형태자료
Also issued online.  
Subject Added Entry-Topical Term
Telecommunication -- Security measures -- Congresses. Data encryption (Computer science) -- Congresses. Cryptography -- Congresses.
000 01874camuu2200445 a 4500
001 000045560894
005 20091126125110
008 050502s2005 gw a b 101 0 eng d
010 ▼a 2005926829
016 7 ▼a 974911976 ▼2 GyFmDB
020 ▼a 3540262237 (pbk. : alk. paper)
020 ▼a 9783540262237 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm60613452
035 ▼a (OCoLC)60613452
035 ▼a (KERIS)REF000012377399
040 ▼a OHX ▼c OHX ▼d CUS ▼d C$Q ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a TK5102.85 ▼b .A26 2005
072 7 ▼a TK ▼2 lcco
082 0 0 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b A184a ▼c 2005
111 2 ▼a ACNS 2005 ▼d (2005 : ▼c New York, N.Y.)
245 1 0 ▼a Applied cryptography and network security : ▼b third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings / ▼c John Ioannidis, Angelos Keromytis, Moti Yung (eds.).
246 3 0 ▼a ACNS 2005
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xi, 530 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3531
504 ▼a Includes bibliographical references and index.
530 ▼a Also issued online.
650 0 ▼a Telecommunication ▼x Security measures ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Ioannidis, John.
700 1 ▼a Keromytis, Angelos.
700 1 ▼a Yung, Moti.
830 0 ▼a Lecture notes in computer science ; ▼v 3531.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 A184a 2005 Accession No. 121186546 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Two-Server Password-Only Authenticated Key Exchange.- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.- A Traitor Tracing Scheme Based on RSA for Fast Decryption.- N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.- Messin' with Texas Deriving Mother's Maiden Names Using Public Records.- Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.- Searching for High-Value Rare Events with Uncheatable Grid Computing.- Digital Signatures Do Not Guarantee Exclusive Ownership.- Thompson's Group and Public Key Cryptography.- Rainbow, a New Multivariable Polynomial Signature Scheme.- Badger - A Fast and Provably Secure MAC.- IDS False Alarm Reduction Using Continuous and Discontinuous Patterns.- Indexing Information for Data Forensics.- Model Generalization and Its Implications on Intrusion Detection.- Intrusion-Resilient Secure Channels.- Optimal Asymmetric Encryption and Signature Paddings.- Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.- Identity Based Encryption Without Redundancy.- OACerts: Oblivious Attribute Certificates.- Dynamic k-Times Anonymous Authentication.- Efficient Anonymous Roaming and Its Security Analysis.- Quantifying Security in Hybrid Cellular Networks.- Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications.- Building Reliable Mix Networks with Fair Exchange.- SCARE of the DES.- Robust Key Extraction from Physical Uncloneable Functions.- Efficient Constructions for One-Way Hash Chains.- Privacy Preserving Keyword Searches on Remote Encrypted Data.- An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption.- Non-interactive Zero-Knowledge Arguments for Voting.- Short Signature and Universal Designated Verifier Signature Without Random Oracles.- Efficient Identity Based Ring Signature.- New Signature Schemes with Coupons and Tight Reduction.


Information Provided By: : Aladin

New Arrivals Books in Related Fields