Applied Cryptography and Network Security

First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings

Editors:

ISBN: 978-3-540-20208-0 (Print) 978-3-540-45203-4 (Online)
Download Book (4,652 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptographic Applications

    1. Book Chapter

      Pages 1-15

      Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case

    2. Book Chapter

      Pages 16-32

      Optimized χ 2-Attack against RC6

    3. Book Chapter

      Pages 33-47

      Anonymity-Enhanced Pseudonym System

  3. Intrusion Detection

    1. Book Chapter

      Pages 48-62

      Using Feedback to Improve Masquerade Detection

    2. Book Chapter

      Pages 63-75

      Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services

    3. Book Chapter

      Pages 76-85

      An IP Traceback Scheme Integrating DPM and PPM

  4. Cryptographic Algorithms

    1. Book Chapter

      Pages 86-95

      Improved Scalable Hash Chain Traversal

    2. Book Chapter

      Pages 96-110

      Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem

    3. Book Chapter

      Pages 111-122

      On the Security of Two Threshold Signature Schemes with Traceable Signers

  5. Digital Signature

    1. Book Chapter

      Pages 123-136

      Proxy and Threshold One-Time Signatures

    2. Book Chapter

      Pages 137-150

      A Threshold GQ Signature Scheme

    3. Book Chapter

      Pages 151-168

      Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary

    4. Book Chapter

      Pages 169-175

      A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme

  6. Security Modelling

    1. Book Chapter

      Pages 176-190

      Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems

    2. Book Chapter

      Pages 191-205

      An Authorization Model for E-consent Requirement in a Health Care Application

    3. Book Chapter

      Pages 206-216

      PLI: A New Framework to Protect Digital Content for P2P Networks

  7. Web Security

    1. Book Chapter

      Pages 217-227

      Improved Algebraic Traitor Tracing Scheme

    2. Book Chapter

      Pages 228-240

      Common Vulnerability Markup Language

    3. Book Chapter

      Pages 241-253

      Trust on Web Browser: Attack vs. Defense

  8. Security Protocols

    1. Book Chapter

      Pages 254-264

      Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards

previous Page of 2