Applied Cryptography and Network Security

6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

  • Editors
  • Steven M. Bellovin
  • Rosario Gennaro
  • Angelos Keromytis
  • Moti Yung
Conference proceedings ACNS 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5037)

Table of contents

  1. Front Matter
  2. Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos
    Pages 21-38
  3. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
    Pages 39-54
  4. Patrick P. Tsang, Sean W. Smith
    Pages 55-74
  5. Joonsang Baek, Jianying Zhou, Feng Bao
    Pages 75-93
  6. Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang
    Pages 94-110
  7. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta
    Pages 111-129
  8. Somitra Kumar Sanadhya, Palash Sarkar
    Pages 130-143
  9. Ivan B. Damgård, Lars R. Knudsen, Søren S. Thomsen
    Pages 144-155
  10. Macià Mut-Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet-Rotger
    Pages 174-187
  11. Marina Blanton
    Pages 188-206
  12. Sébastien Canard, Aline Gouget
    Pages 207-223
  13. Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
    Pages 224-241
  14. Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng
    Pages 242-257
  15. Sébastien Canard, Fabien Laguillaumie, Michel Milhau
    Pages 258-276
  16. David Pointcheval, Sébastien Zimmer
    Pages 277-295
  17. Marek Klonowski, Mirosław Kutyłowski, Anna Lauks
    Pages 296-308
  18. John C. Mitchell, Arnab Roy, Paul Rowe, Andre Scedrov
    Pages 309-327

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.

The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.

Keywords

AES Radio-Frequency Identification (RFID) S-Box anonymity botnets cryptanalysis cryptographic attacks cryptography identity-based encryption internet security key management network security networks priv privacy

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-68914-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-68913-3
  • Online ISBN 978-3-540-68914-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book