Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings

Front Cover
Springer Science & Business Media, May 30, 2005 - Business & Economics - 530 pages
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association). It was held at Columbia University in New York, USA, June 7–10, 2005. This conference proceedings volume contains papers presented in the academic/research track. ACNS covers a large number of research areas that have been gaining importance in recent years due to the development of the Internet, wireless communication and the increased global exposure of computing resources. The papers in this volume are representative of the state of the art in security and cryptography research, worldwide. The Program Committee of the conference received a total of 158 submissions from all over the world, of which 35 submissions were selected for presentation at the a- demic track. In addition to this track, the conference also hosted a technical/ industrial/ short papers track whose presentations were also carefully selected from among the submissions. All submissions were reviewed by experts in the relevant areas.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

TwoServer PasswordOnly Authenticated Key Exchange
1
Strengthening PasswordBased Authentication Protocols Against Online Dictionary Attacks
17
Cryptanalysis of an Improved ClienttoClient PasswordAuthenticated Key Exchange C2CPAKE Scheme
33
Efficient Security Mechanisms for Overlay MulticastBased Content Distribution
40
A Traitor Tracing Scheme Based on RSA for Fast Decryption
56
NParty Encrypted DiffieHellman Key Exchange Using Different Passwords
75
Messin with Texas Deriving Mothers Maiden Names Using Public Records
91
Mitigating Network DenialofService Through DiversityBased Traffic Management
104
Identity Based Encryption Without Redundancy
285
Oblivious Attribute Certificates
301
Dynamic kTimes Anonymous Authentication
318
Efficient Anonymous Roaming and Its Security Analysis
334
Quantifying Security in Hybrid Cellular Networks
350
A Decentralized Currency for Peertopeer and Grid Applications
364
Building Reliable Mix Networks with Fair Exchange
378
Side Channel Analysis for Reverse Engineering of the Data Encryption Standard
393

Searching for HighValue Rare Events with Uncheatable Grid Computing
122
Digital Signatures Do Not Guarantee Exclusive Ownership
138
Thompsons Group and Public Key Cryptography
151
Rainbow a New Multivariable Polynomial Signature Scheme
164
Badger A Fast and Provably Secure MAC
176
IDS False Alarm Reduction Using Continuous and Discontinuous Patternsi
192
Indexing Information for Data Forensics
206
Model Generalization and Its Implications on Intrusion Detection
222
IntrusionResilient Secure Channels
238
Optimal Asymmetric Encryption and Signature Paddings
254
Efficient and LeakageResilient Authenticated Key Transport Protocol Based on RSA
269
Robust Key Extraction from Physical Uncloneable Functions
407
Efficient Constructions for OneWay Hash Chains
423
Privacy Preserving Keyword Searches on Remote Encrypted Data
442
An Efficient Solution to the Millionaires Problem Based on Homomorphic Encryption
456
Noninteractive ZeroKnowledge Arguments for Voting
467
Short Signature and Universal Designated Verifier Signature Without Random Oracles
483
Efficient Identity Based Ring Signature
499
New Signature Schemes with Coupons and Tight Reduction
513
Author Index
529
Copyright

Other editions - View all

Common terms and phrases