Applied Cryptography and Network Security

5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings

  • Editors
  • Jonathan Katz
  • Moti Yung
Conference proceedings

DOI: 10.1007/978-3-540-72738-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4521)

Table of contents (31 papers)

  1. Front Matter
  2. Signature Schemes I

    1. Generic Transformation to Strongly Unforgeable Signatures
      Qiong Huang, Duncan S. Wong, Yiming Zhao
      Pages 1-17
    2. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
      Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
      Pages 18-30
    3. Merkle Signatures with Virtually Unlimited Signature Capacity
      Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume
      Pages 31-45
  3. Computer and Network Security

    1. Midpoints Versus Endpoints: From Protocols to Firewalls
      Diana von Bidder-Senn, David Basin, Germano Caronni
      Pages 46-64
    2. An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
      Liang Lu, Rei Safavi-Naini, Jeffrey Horton, Willy Susilo
      Pages 65-86
    3. Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
      Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
      Pages 87-103
  4. Cryptanalysis

    1. Cryptanalysis of the TRMC-4 Public Key Cryptosystem
      Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
      Pages 104-115
    2. Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
      Stefan Tillich, Christoph Herbst, Stefan Mangard
      Pages 141-157
  5. Group-Oriented Security

    1. Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
      Junghyun Nam, Juryon Paik, Ung Mo Kim, Dongho Won
      Pages 158-176
    2. Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
      Xuxin Xu, Lingyu Wang, Amr Youssef, Bo Zhu
      Pages 177-193
    3. Bayesian Methods for Practical Traitor Tracing
      Philip Zigoris, Hongxia Jin
      Pages 194-206
  6. Cryptographic Protocols

  7. Anonymous Authentication

    1. Universal Accumulators with Efficient Nonmembership Proofs
      Jiangtao Li, Ninghui Li, Rui Xue
      Pages 253-269
  8. Identity-Based Cryptography

    1. Identity-Based Proxy Re-encryption
      Matthew Green, Giuseppe Ateniese
      Pages 288-306

About these proceedings


AES Firewall PKC PKI Signcryption complexity cryptanalysis cryptographic attacks cryptography key management multi-party encryption network security networks privacy signature

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-72737-8
  • Online ISBN 978-3-540-72738-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349