HOME > Detail View

Detail View

Applied cryptography and network security : 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings

Applied cryptography and network security : 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings

Material type
단행본
Personal Author
Katz, Jonathan, 1974-. Yung, Moti.
Title Statement
Applied cryptography and network security : 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings / Jonathan Katz, Moti Yung (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2007.  
Physical Medium
xiii, 498 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 4521
ISBN
9783540727378 (pbk. : alk. paper) 354072737X (pbk. : alk. paper)
General Note
Also issued online.
Bibliography, Etc. Note
Includes bibliographical references and index.
이용가능한 다른형태자료
Also issued online.  
Subject Added Entry-Topical Term
Telecommunication -- Security measures -- Congresses. Data encryption (Computer science) -- Congresses. Cryptography -- Congresses.
000 01745camuu2200445 a 4500
001 000045561537
005 20091125154159
008 091125s2007 gw a 101 0 eng d
010 ▼a 2007927501
016 7 ▼a 983974535 ▼2 GyFmDB
020 ▼a 9783540727378 (pbk. : alk. paper)
020 ▼a 354072737X (pbk. : alk. paper)
035 ▼a (OCoLC)ocm137334571
035 ▼a (OCoLC)137334571
035 ▼a (CStRLIN)CUBGGLAD17549052-B
035 ▼a (KERIS)REF000013660712
040 ▼a OHX ▼c OHX ▼d CUS ▼d BUF ▼d CUY ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a TK5102.94 ▼b .A28 2007
072 7 ▼a TK ▼2 lcco
082 0 0 ▼a 005.8 ▼2 22
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b A184a ▼c 2007
111 2 ▼a ACNS 2007 ▼d (2007 : ▼c Zhuhai, China)
245 1 0 ▼a Applied cryptography and network security : ▼b 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings / ▼c Jonathan Katz, Moti Yung (eds.).
246 3 0 ▼a ACNS 2007
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2007.
300 ▼a xiii, 498 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4521
504 ▼a Includes bibliographical references and index.
530 ▼a Also issued online.
650 0 ▼a Telecommunication ▼x Security measures ▼x Congresses.
650 0 ▼a Data encryption (Computer science) ▼x Congresses.
650 0 ▼a Cryptography ▼x Congresses.
700 1 ▼a Katz, Jonathan, ▼d 1974-.
700 1 ▼a Yung, Moti.
830 0 ▼a Lecture notes in computer science ; ▼v 4521.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 A184a 2007 Accession No. 121186508 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Signature Schemes I.- Generic Transformation to Strongly Unforgeable Signatures.- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.- Merkle Signatures with Virtually Unlimited Signature Capacity.- Computer and Network Security.- Midpoints Versus Endpoints: From Protocols to Firewalls.- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.- Cryptanalysis.- Cryptanalysis of the TRMC-4 Public Key Cryptosystem.- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.- A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA.- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.- Group-Oriented Security.- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.- Bayesian Methods for Practical Traitor Tracing.- Cryptographic Protocols.- A New Protocol for Conditional Disclosure of Secrets and Its Applications.- An Unconditionally Secure Protocol for Multi-Party Set Intersection.- Privacy-Preserving Set Union.- Anonymous Authentication.- Universal Accumulators with Efficient Nonmembership Proofs.- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.- Identity-Based Cryptography.- Identity-Based Proxy Re-encryption.- A More Natural Way to Construct Identity-Based Identification Schemes.- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions.- Certified E-Mail Protocol in the ID-Based Setting.- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks.- Efficient Content Authentication in Peer-to-Peer Networks.- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.- BAP: Broadcast Authentication Using Cryptographic Puzzles.- Efficient Implementation.- Compressed XTR.- Sliding Window Method for NTRU.- Signature Schemes II.- Efficient Certificateless Signature Schemes.- Security Mediated Certificateless Signatures.- Gradually Convertible Undeniable Signatures.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

윤관식 (2020)