This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007.
The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.
Author(s): Fuchun Guo, Yi Mu, Zhide Chen (auth.), Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing (eds.)
Series: Lecture Notes in Computer Science 4856 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 286
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity
Front Matter....Pages -
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles....Pages 1-14
A Generic Construction for Universally-Convertible Undeniable Signatures....Pages 15-33
Fast Digital Signature Algorithm Based on Subgraph Isomorphism....Pages 34-46
Efficient ID-Based Digital Signatures with Message Recovery....Pages 47-59
Achieving Mobility and Anonymity in IP-Based Networks....Pages 60-79
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary....Pages 80-101
Forward-Secure Key Evolution in Wireless Sensor Networks....Pages 102-120
A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations....Pages 121-132
An Intelligent Network-Warning Model with Strong Survivability....Pages 133-145
Running on Karma – P2P Reputation and Currency Systems....Pages 146-158
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption....Pages 159-174
Extended Private Information Retrieval and Its Application in Biometrics Authentications....Pages 175-193
Strongly Secure Certificateless Public Key Encryption Without Pairing....Pages 194-208
Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems....Pages 209-227
How to Secure Your Email Address Book and Beyond....Pages 228-246
Toward Non-parallelizable Client Puzzles....Pages 247-264
Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication....Pages 265-281
Back Matter....Pages -