Applied cryptography and network security third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings /

"The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Communi-cations and Information Security Association). It was held at Columbia University in New York, USA, J une 7-10, 2005."

Corporate Authors: ACNS (Conference) New York, N.Y.)
Other Authors: ACNS (Conference), Ioannidis, John., Keromytis, Angelos., Yung, Moti., SpringerLink (Online service)
Format: eBook
Language: English
Published: Berlin ; New York : Springer, 2005.
Berlin ; New York : 2005.
Physical Description: 1 online resource (xi, 530 pages) : illustrations.
Series: Lecture notes in computer science ; 3531.
Subjects:
Table of Contents:
  • Two-server password-only authenticated key exchange / Jonathan Katz
  • Strengthening password-based authentication protocols against online dictionary attacks / Peng Wang, Yongdae Kim, Vishal Kher
  • Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme / Raphael C.-W. Phan and Bok-Min Goi
  • Efficient security mechanisms for overlay multicast-based content distribution / Sencun Zhu, Chao Yao, Donggang Liu
  • A traitor tracing scheme based on RSA for fast decryption / John Patrick McGregor, Yiqun Lisa Yin, and Ruby B. Lee
  • N-party encrypted diffie-hellman key exchange using different passwords / Jin Wook Byun and Dong Hoon Lee
  • Messin' with Texas deriving mother's maiden names using public records / Virgil Griffith and Markus Jakobsson
  • Mitigating network denial-of-service through diversity-based traffic management / Ashraf Matrawy, Paul C. van Oorschot, and Anil Somayaji
  • Searching for high-value rare events with uncheatable grid computing / Wenliang Du and Michael T. Goodrich
  • Digital signatures do not guarantee exclusive ownership / Thomas Pornin and Julien P. Stern
  • Thompson's group and public key cryptography / Vladimir Shpilrain and Alexander Ushakov
  • Rainbow, a new multivariable polynomial signature scheme / Jintai Ding and Dieter Schmidt
  • Badger : a fast and provably secure MAC / Martin Boesgaard, Thomas Christensen, and Erik Zenner
  • IDS false alarm reduction using continuous and discontinuous patterns / Abdulrahman Alharby and Hideki Imai
  • Indexing information for data forensics / Michael T. Goodrich, Mikhail J. Atallah, and Roberto Tamassia
  • Model generalization and its implications on intrusion detection / Zhuowei Li, Amitabha Das, and Jianying Zhou
  • Intrusion-resilient secure channels / Gene Itkis, Robert McNerney Jr., and Scott Russell
  • Optimal asymmetric encryption and signature paddings Benoit Chevallier-Mames, Duong Hieu Phan, and David Pointcheval
  • Efficient and leakage-resilient authenticated key transport protocol based on RSA / SeongHan Shin, Kazukuni Kobara, and Hideki Imi
  • Identity based encryptionwithout redundancy / Benoit Libert and Jean-Jacques Quisquater
  • OACerts : oblivious attribute certificates / Jiangtao Li and Ninghui Li
  • Dynamic k-times anonymous authentication / Lan Nguyen and Rei Safavi-Naini
  • Efficient anonymous roaming and its security analysis / Guomin Yang, Duncan S. Wong, and Xiaotie Deng
  • Quantifying security in hybrid cellular networks / Markus Jakobsson and Liu Yang
  • Off-line karma : a decentralized currency for peer-to-peer and grid applications / Flavio D. Garcia and Jaap-Henk Hoepman
  • Building reliable mix networks with fair exchange / Michael K. Reiter, XiaoFeng Wang, and Matthew Wright
  • SCARE of the DES (side channel analysis for reverse engineering of the data encryption standard) / Remy Daudigny, Herve Ledi and Frederic Muller
  • Robust key extraction from physical uncloneable functions / B. Skoric, P. Tuyls, and W. Ophey
  • Efficient constructions for one-way hash chains / Yih-Chun Hu, Markus Jakobsson, and Adrian Perrig
  • Privacy preserving keyword searches on remote encrypted data / Yan-Cheng Chang and Michael Mitzenmacher
  • An efficient solution to the millionaires' problem based on homomorphic encryption / Hsiao-Ying Lin and Wen-Guey Tzeng
  • Non-interactive zero-knowledge arguments for voting / Jens Groth
  • Short signature and universal designated verifier signature without random oracles / Rui Zhang, Jun Furukawa, and Hideki Imai
  • Efficient identity based ring signature / Sherman S.M. Chow, Siu-Ming Yiu, and Lucas C.K. Hui
  • New signature schemes with coupons and tight reduction / Benoit Chevallier-Mames.