Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The 1st International Conference on “Applied Cryptography and Network Se- rity” (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte. Ltd. and the Kunming government. It was held in Kunming, China in - tober 2003. The conference proceedings was published as Volume 2846 of the Lecture Notes in Computer Science (LNCS) series of Springer-Verlag. The conference received 191 submissions, from 24 countries and regions; 32 of these papers were accepted, representing 15 countries and regions (acceptance rate of 16.75%). In this volume you will ?nd the revised versions of the - cepted papers that were presented at the conference. In addition to the main track of presentations of accepted papers, an additional track was held in the conference where presentations of an industrial and technical nature were given. These presentations were also carefully selected from a large set of presentation proposals. This new international conference series is the result of the vision of Dr. Yongfei Han. The conference concentrates on current developments that advance the - eas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works and developments in - dustrial and technical frontiers. We thank Dr. Han for initiating this conference and for serving as its General Chair.

Author(s): Ventzislav Nikov, Svetla Nikova, Bart Preneel (auth.), Jianying Zhou, Moti Yung, Yongfei Han (eds.)
Series: Lecture Notes in Computer Science 2846
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 440
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case....Pages 1-15
Optimized χ 2 -Attack against RC6....Pages 16-32
Anonymity-Enhanced Pseudonym System....Pages 33-47
Using Feedback to Improve Masquerade Detection....Pages 48-62
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services....Pages 63-75
An IP Traceback Scheme Integrating DPM and PPM....Pages 76-85
Improved Scalable Hash Chain Traversal....Pages 86-95
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem....Pages 96-110
On the Security of Two Threshold Signature Schemes with Traceable Signers....Pages 111-122
Proxy and Threshold One-Time Signatures....Pages 123-136
A Threshold GQ Signature Scheme....Pages 137-150
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary....Pages 151-168
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme....Pages 169-175
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems....Pages 176-190
An Authorization Model for E-consent Requirement in a Health Care Application....Pages 191-205
PLI: A New Framework to Protect Digital Content for P2P Networks....Pages 206-216
Improved Algebraic Traitor Tracing Scheme....Pages 217-227
Common Vulnerability Markup Language....Pages 228-240
Trust on Web Browser: Attack vs. Defense....Pages 241-253
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards....Pages 254-264
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party....Pages 265-279
Using OCSP to Secure Certificate-Using Transactions in M-commerce....Pages 280-292
Differential Fault Analysis on A.E.S....Pages 293-306
Side-Channel Attack on Substitution Blocks....Pages 307-318
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation....Pages 319-330
A Fast Correlation Attack for LFSR-Based Stream Ciphers....Pages 331-342
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient....Pages 343-356
An Efficient Tree-Based Group Key Agreement Using Bilinear Map....Pages 357-371
A Key Recovery Mechanism for Reliable Group Key Management....Pages 372-386
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model....Pages 387-402
Efficient Distributed Signcryption Scheme as Group Signcryption....Pages 403-417
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors....Pages 418-434
Back Matter....Pages -