3. ACNS 2005:
New York,
NY,
USA
John Ioannidis, Angelos D. Keromytis, Moti Yung (Eds.):
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings.
Lecture Notes in Computer Science 3531 2005, ISBN 3-540-26223-7
- Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor:
Two-Server Password-Only Authenticated Key Exchange.
1-16
- Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon:
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
17-32
- Raphael Chung-Wei Phan, Bok-Min Goi:
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.
33-39
- Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.
40-55
- John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee:
A Traitor Tracing Scheme Based on RSA for Fast Decryption.
56-74
- Jin Wook Byun, Dong Hoon Lee:
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
75-90
- Virgil Griffith, Markus Jakobsson:
Messin' with Texas Deriving Mother's Maiden Names Using Public Records.
91-103
- Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji:
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.
104-121
- Wenliang Du, Michael T. Goodrich:
Searching for High-Value Rare Events with Uncheatable Grid Computing.
122-137
- Thomas Pornin, Julien P. Stern:
Digital Signatures Do Not Guarantee Exclusive Ownership.
138-150
- Vladimir Shpilrain, Alexander Ushakov:
Thompson's Group and Public Key Cryptography.
151-163
- Jintai Ding, Dieter Schmidt:
Rainbow, a New Multivariable Polynomial Signature Scheme.
164-175
- Martin Boesgaard, Thomas Christensen, Erik Zenner:
Badger - A Fast and Provably Secure MAC.
176-191
- Abdulrahman Alharby, Hideki Imai:
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns.
192-205
- Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia:
Indexing Information for Data Forensics.
206-221
- Zhuowei Li, Amitabha Das, Jianying Zhou:
Model Generalization and Its Implications on Intrusion Detection.
222-237
- Gene Itkis, Robert McNerney, Scott Russell:
Intrusion-Resilient Secure Channels.
238-253
- Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval:
Optimal Asymmetric Encryption and Signature Paddings.
254-268
- SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.
269-284
- Benoît Libert, Jean-Jacques Quisquater:
Identity Based Encryption Without Redundancy.
285-300
- Jiangtao Li, Ninghui Li:
OACerts: Oblivious Attribute Certificates.
301-317
- Lan Nguyen, Reihaneh Safavi-Naini:
Dynamic k-Times Anonymous Authentication.
318-333
- Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Efficient Anonymous Roaming and Its Security Analysis.
334-349
- Markus Jakobsson, Liu Yang:
Quantifying Security in Hybrid Cellular Networks.
350-363
- Flavio D. Garcia, Jaap-Henk Hoepman:
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications.
364-377
- Michael K. Reiter, XiaoFeng Wang, Matthew Wright:
Building Reliable Mix Networks with Fair Exchange.
378-392
- Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette:
SCARE of the DES.
393-406
- Boris Skoric, Pim Tuyls, W. Ophey:
Robust Key Extraction from Physical Uncloneable Functions.
407-422
- Yih-Chun Hu, Markus Jakobsson, Adrian Perrig:
Efficient Constructions for One-Way Hash Chains.
423-441
- Yan-Cheng Chang, Michael Mitzenmacher:
Privacy Preserving Keyword Searches on Remote Encrypted Data.
442-455
- Hsiao-Ying Lin, Wen-Guey Tzeng:
An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption.
456-466
- Jens Groth:
Non-interactive Zero-Knowledge Arguments for Voting.
467-482
- Rui Zhang, Jun Furukawa, Hideki Imai:
Short Signature and Universal Designated Verifier Signature Without Random Oracles.
483-498
- Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature.
499-512
- Benoît Chevallier-Mames:
New Signature Schemes with Coupons and Tight Reduction.
513-528
Copyright © Sun Mar 14 22:54:37 2010
by Michael Ley (ley@uni-trier.de)