Skip to main content
  • Conference proceedings
  • © 2007

Applied Cryptography and Network Security

5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4521)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2007.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (31 papers)

  1. Front Matter

  2. Signature Schemes I

    1. Generic Transformation to Strongly Unforgeable Signatures

      • Qiong Huang, Duncan S. Wong, Yiming Zhao
      Pages 1-17
    2. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure

      • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
      Pages 18-30
    3. Merkle Signatures with Virtually Unlimited Signature Capacity

      • Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume
      Pages 31-45
  3. Computer and Network Security

    1. Midpoints Versus Endpoints: From Protocols to Firewalls

      • Diana von Bidder-Senn, David Basin, Germano Caronni
      Pages 46-64
    2. An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme

      • Liang Lu, Rei Safavi-Naini, Jeffrey Horton, Willy Susilo
      Pages 65-86
    3. Analyzing an Electronic Cash Protocol Using Applied Pi Calculus

      • Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
      Pages 87-103
  4. Cryptanalysis

    1. Cryptanalysis of the TRMC-4 Public Key Cryptosystem

      • Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
      Pages 104-115
    2. Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis

      • Stefan Tillich, Christoph Herbst, Stefan Mangard
      Pages 141-157
  5. Group-Oriented Security

    1. Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity

      • Junghyun Nam, Juryon Paik, Ung Mo Kim, Dongho Won
      Pages 158-176
    2. Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme

      • Xuxin Xu, Lingyu Wang, Amr Youssef, Bo Zhu
      Pages 177-193
    3. Bayesian Methods for Practical Traitor Tracing

      • Philip Zigoris, Hongxia Jin
      Pages 194-206
  6. Cryptographic Protocols

    1. Privacy-Preserving Set Union

      • Keith Frikken
      Pages 237-252
  7. Anonymous Authentication

    1. Universal Accumulators with Efficient Nonmembership Proofs

      • Jiangtao Li, Ninghui Li, Rui Xue
      Pages 253-269
    2. Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes

      • StanisÅ‚aw Jarecki, Xiaomin Liu
      Pages 270-287
  8. Identity-Based Cryptography

    1. Identity-Based Proxy Re-encryption

      • Matthew Green, Giuseppe Ateniese
      Pages 288-306

Other Volumes

  1. Applied Cryptography and Network Security

Keywords

  • AES
  • Firewall
  • PKC
  • PKI
  • Signcryption
  • complexity
  • cryptanalysis
  • cryptographic attacks
  • cryptography
  • key management
  • multi-party encryption
  • network security
  • networks
  • privacy
  • signature

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions