Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings

Front Cover
Springer Science & Business Media, May 30, 2006 - Business & Economics - 488 pages
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS 2006 brought together individuals from academia and industry involved in multiple research disciplines of cryptography and security to foster exchange of ideas. This volume (LNCS 3989) contains papers presented in the academic track. ACNS was set a high standard when it was initiated in 2003. There has been a steady improvement in the quality of its program in the past 4 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore). The average acc- tance rate is kept at around 16%. We wish to receive the continued support from the community of cryptographyand security worldwide to further improve its quality and make ACNS one of the leading conferences. The Program Committee of ACNS 2006 received a total of 218 submissions fromallovertheworld,ofwhich33wereselectedforpresentationattheacademic track. In addition to this track, the conference also hosted an industrial track of presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas. We are indebted to our Program Committee members and the external reviewers for the great job they have performed. The proceedings contain revised versions of the accepted papers. However, revisions were not checked and the authors bear full responsibility for the content of their papers.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Adaptive Detection of Local Scanners
1
Probabilistic Proof of an Algorithm to Compute TCP Packet RoundTrip Time for Intrusion Detection
18
Dependable Signing Overlay
33
Do Broken Hash Functions Affect the Security of TimeStamping Schemes?
50
A Handy Multicoupon System
66
An Efficient SingleKey Pirates Tracing Scheme Using CoverFree Families
82
Efficient Memory Bound Puzzles Using Pattern Databases
98
Effect of Malicious Synchronization
114
An Improved Poly1305 MAC
284
Security Model and Efficient Construction
293
Encryption and Error Correction in a Single Cryptographic Primitive
309
Multiparty Secret Handshakes
325
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan
340
Encryption as a Stylesheet
349
Combinatorial Structures for Design of Wireless Sensor Networks
365
Public Key Cryptography Sans Certificates in Ad Hoc Networks
375

The Network That Never Forgets
130
Password Based Server Aided Key Exchange
146
Secure PasswordBased Authenticated Group Key Agreement for DataSharing PeertoPeer Networks
162
Stateful Subset Cover
178
The Rainbow Attack on Stream Ciphers Based on MaioranaMcFarland Functions
194
Breaking a New Instance of TTM Cryptosystems
210
Cryptanalysis of the NParty Encrypted DiffieHellman Key Exchange Using Different Passwords
226
An AES Smart Card Implementation Resistant to Power Analysis Attacks
239
Physical Security Bounds Against Tampering
253
Flexible Exponentiation with Resistance to Side Channel Attacks
268
LocationAware Key Management Using Multilayer Grids for Wireless Sensor Networks
390
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography
405
Results on Almost Resilient Functions
421
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
433
On Optimizing the SecurityThroughput TradeOff in Wireless Networks with Adversaries
448
Improving the Randomized Initial Point Countermeasure Against DPA
459
SyntaxDriven Private Evaluation of Quantified Membership Queries
470
Author Index
486
Copyright

Other editions - View all

Common terms and phrases

About the author (2006)

Jianying Zhou holds an M.Sc. in computer science from the Chinese Academy of Sciences and a Ph.D. in information security from the University of London. Dr. Zhou is project manager at Kent Ridge Digital Labs in Singapore, where he leads an R&D team that develops network security technologies. He is actively involved in the academic world, serving on international conference committees and publishing papers for well-known journals.