Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, in June 2007.

The 31 revised full papers presented were carefully reviewed and selected from around 260 submissions. The papers are organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, security in wireless, ad-hoc, and peer-to-peer networks, as well as efficient implementation.

Author(s): Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan Katz, Moti Yung (eds.)
Series: Lecture Notes in Computer Science 4521
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 502
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Information Systems Applications (incl.Internet); Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Generic Transformation to Strongly Unforgeable Signatures....Pages 1-17
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure....Pages 18-30
Merkle Signatures with Virtually Unlimited Signature Capacity....Pages 31-45
Midpoints Versus Endpoints: From Protocols to Firewalls....Pages 46-64
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme....Pages 65-86
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus....Pages 87-103
Cryptanalysis of the TRMC-4 Public Key Cryptosystem....Pages 104-115
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack....Pages 116-128
A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA....Pages 129-140
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis....Pages 141-157
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity....Pages 158-176
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme....Pages 177-193
Bayesian Methods for Practical Traitor Tracing....Pages 194-206
A New Protocol for Conditional Disclosure of Secrets and Its Applications....Pages 207-225
An Unconditionally Secure Protocol for Multi-Party Set Intersection....Pages 226-236
Privacy-Preserving Set Union....Pages 237-252
Universal Accumulators with Efficient Nonmembership Proofs....Pages 253-269
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes....Pages 270-287
Identity-Based Proxy Re-encryption....Pages 288-306
A More Natural Way to Construct Identity-Based Identification Schemes....Pages 307-322
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions....Pages 323-339
Certified E-Mail Protocol in the ID-Based Setting....Pages 340-353
Efficient Content Authentication in Peer-to-Peer Networks....Pages 354-372
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks....Pages 373-384
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains....Pages 385-400
BAP: Broadcast Authentication Using Cryptographic Puzzles....Pages 401-419
Compressed XTR....Pages 420-431
Sliding Window Method for NTRU....Pages 432-442
Efficient Certificateless Signature Schemes....Pages 443-458
Security Mediated Certificateless Signatures....Pages 459-477
Gradually Convertible Undeniable Signatures....Pages 478-496
Back Matter....Pages -