Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings
John Ioannidis, Angelos Keromytis, Moti Yung
Springer, Jul 22, 2005 - Business & Economics - 530 pages
This book constitutes the refereed proceedings of the Third International Conference on Applied Cryptography and Network Security, ACNS 2005, held in New York, NY, USA in June 2005. The 35 revised full papers presented were carefully reviewed and selected from 158 submissions. Among the topics covered are authentication, key exchange protocols, network denial of service, digital signatures, public key cryptography, MACs, forensics, intrusion detection, secure channels, identity-based encryption, network security analysis, DES, key extraction, homomorphic encryption, and zero-knowledge arguments.
What people are saying - Write a review
We haven't found any reviews in the usual places.
TwoServer PasswordOnly Authenticated Key Exchange
Strengthening PasswordBased Authentication Protocols
Cryptanalysis of an Improved ClienttoClient PasswordAuthenticated
30 other sections not shown
Other editions - View all
Advances in Cryptology adversary alarms algorithm Alice assume assumption bandwidth bits certificate choose ciphertext client coin commitment scheme communication Computer Science construction cookie CRYPTO cryptographic Cryptology cryptosystem decryption keys defined denote dictionary attacks Diffie-Hellman distribution efficient encryption scheme grid computing hash chain hash function IEEE input intrusion detection key exchange key server keyword LNCS modular modular exponentiation multicast N-party n)-grams nodes OCBE one-way chain output overlay network packets pair party password performance permutation plaintext polynomial private key probability problem Proc proof proposed public key queries queue random oracle model randomly rare events remint ring signature RSA-PSS S-box secret key Section security parameter semantic security seminormal seminormal form sends session key signature scheme simulator Springer Springer-Verlag stored Theorem ticket traitor tracing valid verifier vote zero-knowledge zero-knowledge proof