Skip to main content
  • Conference proceedings
  • © 2007

Cryptology and Network Security

6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4856)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2007.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (17 papers)

  1. Front Matter

  2. Signatures

    1. A Generic Construction for Universally-Convertible Undeniable Signatures

      • Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
      Pages 15-33
    2. Fast Digital Signature Algorithm Based on Subgraph Isomorphism

      • Loránd SzÅ‘llÅ‘si, Tamás Marosits, Gábor Fehér, András Recski
      Pages 34-46
    3. Efficient ID-Based Digital Signatures with Message Recovery

      • Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
      Pages 47-59
  3. Network Security

    1. Achieving Mobility and Anonymity in IP-Based Networks

      • Rungrat Wiangsripanawan, Willy Susilo, Rei Safavi-Naini
      Pages 60-79
    2. Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary

      • Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan
      Pages 80-101
    3. Forward-Secure Key Evolution in Wireless Sensor Networks

      • Marek Klonowski, MirosÅ‚aw KutyÅ‚owski, MichaÅ‚ Ren, Katarzyna Rybarczyk
      Pages 102-120
    4. An Intelligent Network-Warning Model with Strong Survivability

      • Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin
      Pages 133-145
  4. Secure Keyword Search and Private Information Retrieval

    1. Extended Private Information Retrieval and Its Application in Biometrics Authentications

      • Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
      Pages 175-193
  5. Public Key Encryption

    1. Strongly Secure Certificateless Public Key Encryption Without Pairing

      • Yinxia Sun, Futai Zhang, Joonsang Baek
      Pages 194-208
  6. Intrusion Detection

  7. Email Security

    1. How to Secure Your Email Address Book and Beyond

      • Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu
      Pages 228-246
  8. Denial of Service Attacks

    1. Toward Non-parallelizable Client Puzzles

      • Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
      Pages 247-264
  9. Authentication

    1. Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication

      • Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
      Pages 265-281
  10. Back Matter

Other Volumes

  1. Cryptology and Network Security

Keywords

  • DoS attacks
  • Information
  • Oracle
  • algorithms
  • anonymity
  • authentication
  • cryptographic protocols
  • encryption
  • micropayments
  • modeling
  • networks
  • peer-to-peer
  • privacy
  • provable security
  • security
  • algorithm analysis and problem complexity

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions