HOME > Detail View

Detail View

Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings

Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings

Material type
단행본
Personal Author
Jakobsson, Markus. Yung, Moti. Zhou, Jianying.
Corporate Author
LINK (Online service)
Title Statement
Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings / Markus Jakobsson, Moti Yung, Jianying Zhou (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2004.  
Physical Medium
xiv, 510 p. : ill. (some col.) ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 3089
ISBN
3540222170 (pbk. : alk. paper) 9783540222170 (pbk. : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Telecommunication -- Security measures -- Congresses. Data encryption (Computer science) -- Congresses. Cryptography -- Congresses.
000 01850camuu2200433 a 4500
001 000045560895
005 20091125154139
008 091120s2004 gw a b 101 0 eng d
010 ▼a 2004106759
020 ▼a 3540222170 (pbk. : alk. paper)
020 ▼a 9783540222170 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm55733076
035 ▼a (OCoLC)55733076
035 ▼a (KERIS)REF000010767590
040 ▼a HNK ▼c HNK ▼d CtY ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a TK5102.94 ▼b .A28 2004
082 0 0 ▼a 005.8 ▼2 22
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b A184a ▼c 2004
111 2 ▼a ACNS 2004 ▼d (2004 : ▼c Huang Shan, China)
245 1 0 ▼a Applied cryptography and network security : ▼b second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings / ▼c Markus Jakobsson, Moti Yung, Jianying Zhou (eds.).
246 3 0 ▼a ACNS 2004
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2004.
300 ▼a xiv, 510 p. : ▼b ill. (some col.) ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3089
504 ▼a Includes bibliographical references and index.
650 0 ▼a Telecommunication ▼x Security measures ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Jakobsson, Markus.
700 1 ▼a Yung, Moti.
700 1 ▼a Zhou, Jianying.
710 2 ▼a LINK (Online service)
830 0 ▼a Lecture notes in computer science ; ▼v 3089.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 A184a 2004 Accession No. 121186544 Availability Available Due Date Make a Reservation Service B M
No. 2 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 A184a 2004 Accession No. 121186545 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Security and Storage.- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.- Private Keyword-Based Push and Pull with Applications to Anonymous Communication.- Secure Conjunctive Keyword Search over Encrypted Data.- Provably Secure Constructions.- Evaluating Security of Voting Schemes in the Universal Composability Framework.- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.- On the Security of Cryptosystems with All-or-Nothing Transform.- Internet Security.- Centralized Management of Virtual Security Zones in IP Networks.- S-RIP: A Secure Distance Vector Routing Protocol.- A Pay-per-Use DoS Protection Mechanism for the Web.- Digital Signature.- Limited Verifier Signature from Bilinear Pairings.- Deniable Ring Authentication Revisited.- A Fully-Functional Group Signature Scheme over Only Known-Order Group.- Security Modelling.- Some Observations on Zap and Its Applications.- Security Measurements of Steganographic Systems.- X2Rep: Enhanced Trust Semantics for the XRep Protocol.- Authenticated Key Exchange.- One-Round Protocols for Two-Party Authenticated Key Exchange.- Password Authenticated Key Exchange Using Quadratic Residues.- Key Agreement Using Statically Keyed Authenticators.- Security of Deployed Systems.- Low-Latency Cryptographic Protection for SCADA Communications.- A Best Practice for Root CA Key Update in PKI.- SQLrand: Preventing SQL Injection Attacks.- Cryptosystems: Design and Analysis.- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.- Success Probability in ? 2-Attacks.- More Generalized Clock-Controlled Alternating Step Generator.- Cryptographic Protocols.- FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy.- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.- Side Channels and Protocol Analysis.- Security Analysis of CRT-Based Cryptosystems.- Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords.- Intrusion Detection and DoS.- Advanced Packet Marking Mechanism with Pushback for IP Traceback.- A Parallel Intrusion Detection System for High-Speed Networks.- A Novel Framework for Alert Correlation and Understanding.- Cryptographic Algorithms.- An Improved Algorithm for uP+vQ Using JSF .- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p n ).- Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

윤관식 (2020)