Applied Cryptography and Network Security

Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings

  • John Ioannidis
  • Angelos Keromytis
  • Moti Yung
Conference proceedings ACNS 2005

DOI: 10.1007/b137093

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3531)

Table of contents (35 papers)

  1. Front Matter
  2. Two-Server Password-Only Authenticated Key Exchange
    Jonathan Katz, Philip MacKenzie, Gelareh Taban, Virgil Gligor
    Pages 1-16
  3. Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
    Pages 17-32
  4. Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution
    Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Pages 40-55
  5. A Traitor Tracing Scheme Based on RSA for Fast Decryption
    John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
    Pages 56-74
  6. Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management
    Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji
    Pages 104-121
  7. Searching for High-Value Rare Events with Uncheatable Grid Computing
    Wenliang Du, Michael T. Goodrich
    Pages 122-137
  8. Digital Signatures Do Not Guarantee Exclusive Ownership
    Thomas Pornin, Julien P. Stern
    Pages 138-150
  9. Thompson’s Group and Public Key Cryptography
    Vladimir Shpilrain, Alexander Ushakov
    Pages 151-163
  10. Rainbow, a New Multivariable Polynomial Signature Scheme
    Jintai Ding, Dieter Schmidt
    Pages 164-175
  11. Badger – A Fast and Provably Secure MAC
    Martin Boesgaard, Thomas Christensen, Erik Zenner
    Pages 176-191
  12. IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
    Abdulrahman Alharby, Hideki Imai
    Pages 192-205
  13. Indexing Information for Data Forensics
    Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia
    Pages 206-221
  14. Model Generalization and Its Implications on Intrusion Detection
    Zhuowei Li, Amitabha Das, Jianying Zhou
    Pages 222-237
  15. Intrusion-Resilient Secure Channels
    Gene Itkis, Robert McNerney Jr., Scott Russell
    Pages 238-253
  16. Optimal Asymmetric Encryption and Signature Paddings
    Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
    Pages 254-268
  17. Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
    SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Pages 269-284

About these proceedings


The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association). It was held at Columbia University in New York, USA, June 7–10, 2005. This conference proceedings volume contains papers presented in the academic/research track. ACNS covers a large number of research areas that have been gaining importance in recent years due to the development of the Internet, wireless communication and the increased global exposure of computing resources. The papers in this volume are representative of the state of the art in security and cryptography research, worldwide. The Program Committee of the conference received a total of 158 submissions from all over the world, of which 35 submissions were selected for presentation at the a- demic track. In addition to this track, the conference also hosted a technical/ industrial/ short papers track whose presentations were also carefully selected from among the submissions. All submissions were reviewed by experts in the relevant areas.


DES Denial of Service Information Oracle PKC RSA Web security Web service security authentication communications security cryptography multi-party encryption network security secure networking security

Editors and affiliations

  • John Ioannidis
    • 1
  • Angelos Keromytis
    • 2
  • Moti Yung
    • 3
  1. 1.AT&T Labs – Research 
  2. 2.Computer Science DepartmentColumbia University 
  3. 3.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-26223-7
  • Online ISBN 978-3-540-31542-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349