Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8–11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag. The area of research that ACNS covers has been gaining importance in recent years due to the development of the Internet, which, in turn, implies global exposure of computing resources. Many ?elds of research were covered by the program of this track, presented in this proceedings volume. We feel that the papers herein indeed re?ect the state of the art in security and cryptography research, worldwide. The program committee of the conference received a total of 297 submissions from all over the world, of which 36 submissions were selected for presentation during the academic track. In addition to this track, the conference also hosted a technical/industrial track of presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas.

Author(s): Michael E. Locasto, Angelos D. Keromytis (auth.), Markus Jakobsson, Moti Yung, Jianying Zhou (eds.)
Series: Lecture Notes in Computer Science 3089
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 511
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Information Storage and Retrieval; Information Systems Applications (incl.Internet); Management of Computing and Information Systems

Front Matter....Pages -
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap....Pages 1-15
Private Keyword-Based Push and Pull with Applications to Anonymous Communication....Pages 16-30
Secure Conjunctive Keyword Search over Encrypted Data....Pages 31-45
Evaluating Security of Voting Schemes in the Universal Composability Framework....Pages 46-60
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security....Pages 61-75
On the Security of Cryptosystems with All-or-Nothing Transform....Pages 76-90
Centralized Management of Virtual Security Zones in IP Networks....Pages 91-102
S-RIP: A Secure Distance Vector Routing Protocol....Pages 103-119
A Pay-per-Use DoS Protection Mechanism for the Web....Pages 120-134
Limited Verifier Signature from Bilinear Pairings....Pages 135-148
Deniable Ring Authentication Revisited....Pages 149-163
A Fully-Functional Group Signature Scheme over Only Known-Order Group....Pages 164-179
Some Observations on Zap and Its Applications....Pages 180-193
Security Measurements of Steganographic Systems....Pages 194-204
X 2 Rep: Enhanced Trust Semantics for the XRep Protocol....Pages 205-219
One-Round Protocols for Two-Party Authenticated Key Exchange....Pages 220-232
Password Authenticated Key Exchange Using Quadratic Residues....Pages 233-247
Key Agreement Using Statically Keyed Authenticators....Pages 248-262
Low-Latency Cryptographic Protection for SCADA Communications....Pages 263-277
A Best Practice for Root CA Key Update in PKI....Pages 278-291
SQLrand: Preventing SQL Injection Attacks....Pages 292-302
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem....Pages 303-309
Success Probability in χ 2 -Attacks....Pages 310-325
More Generalized Clock-Controlled Alternating Step Generator....Pages 326-338
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy....Pages 339-354
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model....Pages 355-368
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity....Pages 369-382
Security Analysis of CRT-Based Cryptosystems....Pages 383-397
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits....Pages 398-413
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords....Pages 414-425
Advanced Packet Marking Mechanism with Pushback for IP Traceback....Pages 426-438
A Parallel Intrusion Detection System for High-Speed Networks....Pages 439-451
A Novel Framework for Alert Correlation and Understanding....Pages 452-466
An Improved Algorithm for uP + vQ Using JSF $_{3}^{1}$ ....Pages 467-478
New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF ( p n )....Pages 479-493
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions....Pages 494-508
Back Matter....Pages -