Skip to content

Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings

Best in textbook rentals since 2012!

ISBN-10: 3540347038

ISBN-13: 9783540347033

Edition: 2006

Authors: Jianying Zhou, Moti Yung, Feng Bao

List price: $109.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006. The 33 revised full papers presented were carefully reviewed and selected from 218 submissions. The papers are organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.
Customers also bought

Book details

List price: $109.99
Copyright year: 2006
Publisher: Springer Berlin / Heidelberg
Publication date: 5/30/2006
Binding: Paperback
Pages: 490
Size: 6.10" wide x 9.25" long x 1.25" tall
Weight: 3.432

Jianying Zhou holds an M.Sc. in computer science from the Chinese Academy of Sciences and a Ph.D. in information security from the University of London. Dr. Zhou is project manager at Kent Ridge Digital Labs in Singapore, where he leads an R&D team that develops network security technologies. He is actively involved in the academic world, serving on international conference committees and publishing papers for well-known journals.

Professor and head of the fluid mechanics laboratory at Xiamen University, Fujian, China.

Adaptive detection of local scanners
Probabilistic proof of an algorithm to compute TCP packet round-trip time for intrusion detection
DSO : dependable signing overlay
Do broken hash functions affect the security of time-stamping schemes?
A handy multi-coupon system
An efficient single-key pirates tracing scheme using cover-free families
Efficient memory bound puzzles using pattern databases
Effect of malicious synchronization
Misusing unstructured P2P systems to perform DoS attacks : the network that never forgets
Password based server aided key exchange
Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks
Stateful subset cover
The rainbow attack on stream ciphers based on Maiorana-McFarland functions
Breaking a new instance of TTM cryptosystems
Cryptanalysis of the N-party encrypted Diffie-Hellman key exchange using different passwords
An AES smart card implementation resistant to power analysis attacks
Physical security bounds against tampering
Flexible exponentiation with resistance to side channel attacks
An improved Poly1305 MAC
Certificateless public-key signature : security model and efficient construction
High diffusion cipher : encryption and error correction in a single cryptographic primitive
Authentication for paranoids : multi-party secret handshakes
On the security of the authentication module of Chinese WLAN standard implementation plan
W3Bcrypt : encryption as a stylesheet
Combinatorial structures for design of wireless sensor networks
Public key cryptography sans certificates in ad hoc networks
Location-aware key management using multi-layer grids for wireless sensor networks
A general methodology for pipelining the point multiplication operation in curve based cryptography
Results on almost resilient functions
Real perfect contrast visual secret sharing schemes with reversing
On optimizing the security-throughput trade-off in wireless networks with adversaries
Improving the randomized initial point countermeasure against DPA
Syntax-driven private evaluation of quantified membership queries