Skip to content

Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 2008 - Proceedings

Best in textbook rentals since 2012!

ISBN-10: 3540689133

ISBN-13: 9783540689133

Edition: 2008

Authors: Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung

List price: $54.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.
Customers also bought

Book details

List price: $54.99
Copyright year: 2008
Publisher: Springer Berlin / Heidelberg
Publication date: 5/27/2008
Binding: Paperback
Pages: 508
Size: 6.10" wide x 9.25" long x 1.25" tall
Weight: 1.760
Language: English

On the Effectiveness of Internal Patching Against File-Sharing Worms
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Pushback for Overlay Networks: Protecting Against Malicious Insiders
PPAA: Peer-to-Peer Anonymous Authentication
Generic Constructions of Stateful Public Key Encryption and Their Applications
Traceable and Retrievable Identity-Based Encryption
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
Attacking Reduced Round SHA-256
DAKOTA - Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?
Replay Attack in a Fair Exchange Protocol
Improved Conditional E-Payments
Anonymity in Transferable E-cash
Generic Security-Amplifying Methods of Ordinary Digital Signatures
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Trapdoor Sanitizable Signatures and Their Application to Content Protection
Multi-factor Authenticated Key Exchange
Repelling Detour Attack Against Onions with Re-encryption
Analysis of EAP-GPSK Authentication Protocol
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
An Authentication Scheme Based on the Twisted Conjugacy Problem
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation
On the Security of the CCM Encryption Mode and of a Slight Variant
wN AF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm
A Very Compact "Perfectly Masked" S-Box for AES
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Traceable Privacy of Recent Provably-Secure RFID Protocols
The Security of EPC Gen2 Compliant RFID Protocols
Author Index