Cryptology and Network Security

8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings

  • Juan A. Garay
  • Atsuko Miyaji
  • Akira Otsuka
Conference proceedings CANS 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5888)

Table of contents

  1. Front Matter
  2. Cryptographic Protocol and Schemes I

    1. Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 1-20
    2. G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 21-40
  3. Invited Talk 1

  4. Cryptanalysis I

    1. Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang
      Pages 58-75
    2. Peng Zhang, Bing Sun, Chao Li
      Pages 76-86
    3. Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk
      Pages 87-102
    4. Jiali Choy, Huihui Yap, Khoongming Khoo
      Pages 103-118
  5. Wireless and Sensor Network Security I

    1. Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
      Pages 134-153
  6. Network Security

    1. Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin
      Pages 174-188
  7. Privacy and Anonymity

    1. Ghita Mezzour, Adrian Perrig, Virgil Gligor, Panos Papadimitratos
      Pages 189-208
    2. Xiangxi Li, Yu Zhang, Yuxin Deng
      Pages 209-225
    3. Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
      Pages 226-247
  8. Functional and Searchable Encryption

    1. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang
      Pages 248-258
    2. Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
      Pages 259-277
  9. Invited Talk 2

  10. Authentication

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009.

The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.

Keywords

Code Information MQQ cryptosystem RFID privacy RFID security authentication calculus complexity cryptanalysis cryptography e-cash network security sensor networks tate p wireless networks

Editors and affiliations

  • Juan A. Garay
    • 1
  • Atsuko Miyaji
    • 2
  • Akira Otsuka
    • 3
  1. 1.AT&T Labs ResearchNJUSA
  2. 2.Japan Advanced Institute of Science and Technology (JAIST)NomiJapan
  3. 3.National Institute of Advanced Industrial Science and Technoloy (AIST)TokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-10433-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10432-9
  • Online ISBN 978-3-642-10433-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book