Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings
Jianying Zhou, Moti Yung, Yongfei Han
Springer, Dec 5, 2003 - Business & Economics - 436 pages
This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003. The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications, intrusion detection, cryptographic algorithms, digital signatures, security modeling, Web security, security protocols, cryptanalysis, key management, and efficient implementations.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Optimized x2Attack against RC6
24 other sections not shown
Other editions - View all
adversary algorithm attack authentication biometric bits broadcast browser buyer certification authority ciphertext classifier computes correlation attacks credential cryptographic Cryptology cryptosystems CVML decrypt denote digital signature discrete logarithm distributed DRM system e-consent efficient encryption scheme equation feedback feedback-on-alarm policy function group key hash chain homomorphic encryption IEEE implementation input Internet intrusion detection key agreement key recovery LFSR license LNCS matrix mobile agent modular exponentiation multiplication node number of plaintexts OCSP one-time signature output P2P networks packet paper parameters pebble plaintexts players polynomial private key proof proposed protocol proxy pseudonym system public key random ring signature router secret key secret sharing Section server sessions signature scheme signcryption signer smartcard spoofing Springer-Verlag techniques threshold cryptosystems threshold signature tracing scheme traitor tracing trust valid verifier vulnerability watermark certification authority x2-value