Advertisement

Applied Cryptography and Network Security

5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings

  • Editors
  • Jonathan Katz
  • Moti Yung

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4521)

Table of contents

  1. Front Matter
  2. Signature Schemes I

    1. Qiong Huang, Duncan S. Wong, Yiming Zhao
      Pages 1-17
    2. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
      Pages 18-30
    3. Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume
      Pages 31-45
  3. Computer and Network Security

    1. Diana von Bidder-Senn, David Basin, Germano Caronni
      Pages 46-64
    2. Liang Lu, Rei Safavi-Naini, Jeffrey Horton, Willy Susilo
      Pages 65-86
    3. Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
      Pages 87-103
  4. Cryptanalysis

    1. Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
      Pages 104-115
    2. Stefan Tillich, Christoph Herbst, Stefan Mangard
      Pages 141-157
  5. Group-Oriented Security

    1. Junghyun Nam, Juryon Paik, Ung Mo Kim, Dongho Won
      Pages 158-176
    2. Xuxin Xu, Lingyu Wang, Amr Youssef, Bo Zhu
      Pages 177-193
    3. Philip Zigoris, Hongxia Jin
      Pages 194-206
  6. Cryptographic Protocols

  7. Anonymous Authentication

    1. Jiangtao Li, Ninghui Li, Rui Xue
      Pages 253-269
  8. Identity-Based Cryptography

    1. Matthew Green, Giuseppe Ateniese
      Pages 288-306
    2. Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
      Pages 307-322
    3. Chunxiang Gu, Yuefei Zhu, Yonghui Zheng
      Pages 340-353
  9. Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks

    1. Roberto Tamassia, Nikos Triandopoulos
      Pages 354-372
    2. Fagen Li, Yupu Hu, Chuanrong Zhang
      Pages 373-384
    3. Patrick Schaller, Srdjan Čapkun, David Basin
      Pages 401-419
  10. Efficient Implementation

    1. Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
      Pages 420-431
    2. Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park
      Pages 432-442
  11. Signature Schemes II

    1. Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
      Pages 443-458
    2. Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi
      Pages 459-477
    3. Laila El Aimani, Damien Vergnaud
      Pages 478-496
  12. Back Matter

About these proceedings

Keywords

AES Firewall PKC PKI Signcryption complexity cryptanalysis cryptographic attacks cryptography key management multi-party encryption network security networks privacy signature

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-72738-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-72737-8
  • Online ISBN 978-3-540-72738-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site