Advertisement

Table of contents

  1. Front Matter
  2. Cryptanalysis

    1. Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
      Pages 1-12
    2. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
      Pages 13-25
  3. Intrusion Detection and Viruses

  4. Authentication and Signature

  5. Signcryption

    1. Qin Wang, Zhenfu Cao
      Pages 161-171
    2. Yuan Zhou, Zhenfu Cao, Rongxing Lu
      Pages 172-185
  6. E-mail Security

    1. Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
      Pages 186-199
    2. Zhenfeng Zhang, Jing Xu, Dengguo Feng
      Pages 200-210
  7. Cryptosystems

    1. Yuh-Hua Hu, Lih-Chung Wang, Chun-Yen Chou, Feipei Lai
      Pages 211-222
    2. Pin-Hui Ke, Tai-Lin Liu, Qiao-Yan Wen
      Pages 236-246
  8. Privacy and Tracing

    1. Kun Peng, Ed Dawson, Juanma Gonzalez Nieto, Eiji Okamoto, Javier López
      Pages 247-260
    2. Lasse Øverlier, Tønnes Brekne, André Årnes
      Pages 261-273
  9. Information Hiding

    1. Limin Gu, Yanmei Fang, Jiwu Huang
      Pages 274-287
  10. Firewalls, Denial of Service and DNS Security

    1. Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese
      Pages 288-303
    2. Liang Lu, Rei Safavi-Naini, Jeffrey Horton, Willy Susilo
      Pages 304-319
  11. Trust Management

    1. Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao
      Pages 334-348
  12. Back Matter

About these proceedings

Keywords

Denial of Service firewall information network security privacy security trust trust management

Editors and affiliations

  • Yvo G. Desmedt
    • 1
  • Huaxiong Wang
    • 2
  • Yi Mu
    • 3
  • Yongqing Li
    • 4
  1. 1.Department of Computer ScienceUniversity College London 
  2. 2.Centre for Advanced Computing - Algorithms and Cryptography Department of ComputingMacquarie UniversityAustralia
  3. 3.Centre for Computer and Information Security Research School of Computer Science and Software EngineeringUniversity of WollongongAustralia
  4. 4.Fujian Normal UniversityFuzhouChina

Bibliographic information

  • DOI https://doi.org/10.1007/11599371
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-30849-2
  • Online ISBN 978-3-540-32298-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site