Applied Cryptography and Network Security

Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings

  • John Ioannidis
  • Angelos Keromytis
  • Moti Yung

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3531)

Table of contents

  1. Front Matter
  2. Jonathan Katz, Philip MacKenzie, Gelareh Taban, Virgil Gligor
    Pages 1-16
  3. Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
    Pages 17-32
  4. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Pages 40-55
  5. John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
    Pages 56-74
  6. Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji
    Pages 104-121
  7. Wenliang Du, Michael T. Goodrich
    Pages 122-137
  8. Thomas Pornin, Julien P. Stern
    Pages 138-150
  9. Vladimir Shpilrain, Alexander Ushakov
    Pages 151-163
  10. Jintai Ding, Dieter Schmidt
    Pages 164-175
  11. Martin Boesgaard, Thomas Christensen, Erik Zenner
    Pages 176-191
  12. Abdulrahman Alharby, Hideki Imai
    Pages 192-205
  13. Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia
    Pages 206-221
  14. Zhuowei Li, Amitabha Das, Jianying Zhou
    Pages 222-237
  15. Gene Itkis, Robert McNerney Jr., Scott Russell
    Pages 238-253
  16. Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
    Pages 254-268
  17. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Pages 269-284

About these proceedings

Introduction

The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association). It was held at Columbia University in New York, USA, June 7–10, 2005. This conference proceedings volume contains papers presented in the academic/research track. ACNS covers a large number of research areas that have been gaining importance in recent years due to the development of the Internet, wireless communication and the increased global exposure of computing resources. The papers in this volume are representative of the state of the art in security and cryptography research, worldwide. The Program Committee of the conference received a total of 158 submissions from all over the world, of which 35 submissions were selected for presentation at the a- demic track. In addition to this track, the conference also hosted a technical/ industrial/ short papers track whose presentations were also carefully selected from among the submissions. All submissions were reviewed by experts in the relevant areas.

Keywords

DES Denial of Service Information Oracle PKC RSA Web security Web service security authentication communications security cryptography multi-party encryption network security secure networking security

Editors and affiliations

  • John Ioannidis
    • 1
  • Angelos Keromytis
    • 2
  • Moti Yung
    • 3
  1. 1.AT&T Labs – Research 
  2. 2.Computer Science DepartmentColumbia University 
  3. 3.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b137093
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-26223-7
  • Online ISBN 978-3-540-31542-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book