Applied Cryptography and Network Security

First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings

  • Jianying Zhou
  • Moti Yung
  • Yongfei Han
Conference proceedings ACNS 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2846)

Table of contents

  1. Front Matter
  2. Cryptographic Applications

    1. Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji
      Pages 16-32
    2. Yuko Tamura, Atsuko Miyaji
      Pages 33-47
  3. Intrusion Detection

    1. Zhi Guo, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu, Jia-Guang Sun
      Pages 63-75
    2. Fan Min, Jun-yan Zhang, Guo-wie Yang
      Pages 76-85
  4. Cryptographic Algorithms

  5. Digital Signature

    1. Mohamed Al-Ibrahim, Anton Cerny
      Pages 123-136
    2. Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng
      Pages 137-150
    3. Chong-zhi Gao, Zheng-an Yao, Lei Li
      Pages 169-175
  6. Security Modelling

    1. Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
      Pages 206-216
  7. Web Security

    1. Chunyan Bai, Guiliang Feng
      Pages 217-227
    2. Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang
      Pages 228-240
    3. Tie-Yan Li, Yongdong Wu
      Pages 241-253

About these proceedings

Introduction

The 1st International Conference on “Applied Cryptography and Network Se- rity” (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte. Ltd. and the Kunming government. It was held in Kunming, China in - tober 2003. The conference proceedings was published as Volume 2846 of the Lecture Notes in Computer Science (LNCS) series of Springer-Verlag. The conference received 191 submissions, from 24 countries and regions; 32 of these papers were accepted, representing 15 countries and regions (acceptance rate of 16.75%). In this volume you will ?nd the revised versions of the - cepted papers that were presented at the conference. In addition to the main track of presentations of accepted papers, an additional track was held in the conference where presentations of an industrial and technical nature were given. These presentations were also carefully selected from a large set of presentation proposals. This new international conference series is the result of the vision of Dr. Yongfei Han. The conference concentrates on current developments that advance the - eas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works and developments in - dustrial and technical frontiers. We thank Dr. Han for initiating this conference and for serving as its General Chair.

Keywords

applied cryptography cryptographic attacks cryptographic protocols cryptography internet security intrusion detection network security privacy public key cryptography secure communications secure networking security signature schemes web security

Editors and affiliations

  • Jianying Zhou
    • 1
  • Moti Yung
    • 2
  • Yongfei Han
    • 3
  1. 1.Cryptography and Security Department Institute for Infocomm ResearchSingapore
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA
  3. 3.Shangdi Information Industry BaseONETS Wireless&Internet Security Tech. Co., LTD.BeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/b13996
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20208-0
  • Online ISBN 978-3-540-45203-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book