Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Markus Jakobsson, Moti Yung, Jianying Zhou
Springer, Jul 27, 2004 - Business & Economics - 510 pages
This book constitutes the refereed proceedings of the Second International Conference on Applied Cryptography and Network Security, ACNS 2004, held in Yellow Mountain, China, in June 2004. The 36 revised full papers presented were carefully reviewed and selected from 297 submissions. The papers are organized in topical sections on security and storage, provably secure constructions, Internet security, digital signatures, security modeling, authenticated key exchange, security of deployed systems, cryptosystems design and analysis, cryptographic protocols, side channels and protocol analysis, intrusion detection and DoS, and cryptographic algorithms.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Security and Storage
Private KeywordBased Push and Pull with Applications
Secure Conjunctive Keyword Search over Encrypted Data
31 other sections not shown
Other editions - View all
adversary algorithm Alice Alice and Bob anonymous AONT authentication binary bits block block cipher chameleon hash cipher ciphertext client communication Computer Science countermeasure cryptographic Cryptology cryptosystem database decryption shares defined deniable denote Diffie-Hellman discrete logarithm distribution efficient FDLKH group signature hash function IEEE implementation IND-CCA input integer key agreement key exchange keyword LNCS membership certificate node output packets pair paper party password peer permutation plaintext players polynomial private key proof system proposed protocol public key public-coin quadratic residue query random oracle random oracle model result root CA key router routing S-RIP SCADA secret key Section self-signed certificate sensor sequence server session key shuffle side channel attacks signature scheme signer simulation Springer-Verlag Table Theorem threshold traceback traffic trust valid vector voting watermark XRep zero-knowledge zero-knowledge proof