Skip to main content
  • Conference proceedings
  • © 2008

Applied Cryptography and Network Security

6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5037)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2008.

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-68914-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (30 papers)

  1. Front Matter

  2. Peeking Through the Cloud: DNS-Based Estimation and Its Applications

    • Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos
    Pages 21-38
  3. Pushback for Overlay Networks: Protecting Against Malicious Insiders

    • Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
    Pages 39-54
  4. PPAA: Peer-to-Peer Anonymous Authentication

    • Patrick P. Tsang, Sean W. Smith
    Pages 55-74
  5. Generic Constructions of Stateful Public Key Encryption and Their Applications

    • Joonsang Baek, Jianying Zhou, Feng Bao
    Pages 75-93
  6. Traceable and Retrievable Identity-Based Encryption

    • Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang
    Pages 94-110
  7. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures

    • Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta
    Pages 111-129
  8. Attacking Reduced Round SHA-256

    • Somitra Kumar Sanadhya, Palash Sarkar
    Pages 130-143
  9. Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography

    • Ivan B. Damgård, Lars R. Knudsen, Søren S. Thomsen
    Pages 144-155
  10. Replay Attack in a Fair Exchange Protocol

    • Macià Mut-Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet-Rotger
    Pages 174-187
  11. Improved Conditional E-Payments

    • Marina Blanton
    Pages 188-206
  12. Anonymity in Transferable E-cash

    • Sébastien Canard, Aline Gouget
    Pages 207-223
  13. Generic Security-Amplifying Methods of Ordinary Digital Signatures

    • Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
    Pages 224-241
  14. New Differential-Algebraic Attacks and Reparametrization of Rainbow

    • Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng
    Pages 242-257
  15. Trapdoor Sanitizable Signatures and Their Application to Content Protection

    • Sébastien Canard, Fabien Laguillaumie, Michel Milhau
    Pages 258-276
  16. Multi-factor Authenticated Key Exchange

    • David Pointcheval, Sébastien Zimmer
    Pages 277-295
  17. Repelling Detour Attack Against Onions with Re-encryption

    • Marek Klonowski, Mirosław Kutyłowski, Anna Lauks
    Pages 296-308
  18. Analysis of EAP-GPSK Authentication Protocol

    • John C. Mitchell, Arnab Roy, Paul Rowe, Andre Scedrov
    Pages 309-327

Other Volumes

  1. Applied Cryptography and Network Security

    6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

About this book

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.

The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.

Keywords

  • AES
  • Radio-Frequency Identification (RFID)
  • S-Box
  • anonymity
  • botnets
  • cryptanalysis
  • cryptographic attacks
  • cryptography
  • identity-based encryption
  • internet security
  • key management
  • network security
  • networks
  • priv
  • privacy

Bibliographic Information

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-68914-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.00
Price excludes VAT (USA)