Cryptology and Network Security: 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.

The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.

Author(s): Jaimee Brown, Juan Manuel González Nieto, Colin Boyd (auth.), David Pointcheval, Yi Mu, Kefei Chen (eds.)
Series: Lecture Notes in Computer Science 4301 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 384
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems....Pages 1-18
Efficient Identity-Based Encryption with Tight Security Reduction....Pages 19-36
A Diffie-Hellman Key Exchange Protocol Without Random Oracles....Pages 37-54
Authenticated Group Key Agreement for Multicast....Pages 55-72
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks....Pages 73-89
Efficient Mutual Data Authentication Using Manually Authenticated Strings....Pages 90-107
Achieving Multicast Stream Authentication Using MDS Codes....Pages 108-125
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps....Pages 126-143
Security Model of Proxy-Multi Signature Schemes....Pages 144-152
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque....Pages 153-167
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields....Pages 168-181
Improved Collision Attack on Reduced Round Camellia....Pages 182-190
Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks....Pages 191-202
Bitslice Implementation of AES....Pages 203-212
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF (3)....Pages 213-223
Steganalysis Based on Differential Statistics....Pages 224-240
Watermarking Essential Data Structures for Copyright Protection....Pages 241-258
A Note of Perfect Nonlinear Functions....Pages 259-269
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing....Pages 270-285
Cooperative Intrusion Detection for Web Applications....Pages 286-302
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis....Pages 303-317
Smart Architecture for High-Speed Intrusion Detection and Prevention Systems....Pages 318-328
A Multi-agent Cooperative Model and System for Integrated Security Monitoring....Pages 329-341
Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network....Pages 342-353
An Immune-Based Model for Service Survivability....Pages 354-363
X 2BT Trusted Reputation System: A Robust Mechanism for P2P Networks....Pages 364-380
Back Matter....Pages -