Cryptology and Network Security: 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology and Network Security, CANS 2005, held in Xiamen, China in December 2005.

The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management.

Author(s): Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang (auth.), Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li (eds.)
Series: Lecture Notes in Computer Science 3810 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 352
Tags: Data Encryption; Operating Systems; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
The Second-Preimage Attack on MD4....Pages 1-12
On the Security of Certificateless Signature Schemes from Asiacrypt 2003....Pages 13-25
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme....Pages 26-34
Cryptanalysis of Two Group Key Management Protocols for Secure Multicast....Pages 35-48
Security Analysis of Password-Authenticated Key Agreement Protocols....Pages 49-58
An Immune-Based Model for Computer Virus Detection....Pages 59-71
A New Model for Dynamic Intrusion Detection....Pages 72-84
Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection....Pages 85-95
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time....Pages 96-109
ID-Based Aggregate Signatures from Bilinear Pairings....Pages 110-119
Efficient Identity-Based Signatures and Blind Signatures....Pages 120-133
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures....Pages 134-146
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange....Pages 147-160
Two Proxy Signcryption Schemes from Bilinear Pairings....Pages 161-171
Constructing Secure Warrant-Based Proxy Signcryption Schemes....Pages 172-185
Design and Implementation of an Inline Certified E-mail Service....Pages 186-199
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery....Pages 200-210
Similar Keys of Multivariate Quadratic Public Key Cryptosystems....Pages 211-222
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems....Pages 223-235
Constructions of Almost Resilient Functions....Pages 236-246
A Novel Method to Maintain Privacy in Mobile Agent Applications....Pages 247-260
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring....Pages 261-273
Revaluation of Error Correcting Coding in Watermarking Channel....Pages 274-287
On the Performance and Analysis of DNS Security Extensions....Pages 288-303
On Securing RTP-Based Streaming Content with Firewalls....Pages 304-319
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling....Pages 320-333
Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles....Pages 334-348
Back Matter....Pages -