Advertisement

Applied Cryptography and Network Security

9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings

  • Javier Lopez
  • Gene Tsudik
Conference proceedings ACNS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6715)

Table of contents

  1. Front Matter
  2. Session 1: Malware and Intrusion Detection

    1. Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo
      Pages 1-18
    2. Ashwin Chaugule, Zhi Xu, Sencun Zhu
      Pages 19-37
    3. Mansoor Alicherry, Angelos D. Keromytis
      Pages 38-56
  3. Session 2: Attacks I

    1. Martin Albrecht, Carlos Cid
      Pages 57-72
    2. Alex Biryukov, Ilya Kizhvatov, Bin Zhang
      Pages 91-109
    3. Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux
      Pages 110-129
  4. Session 3: Applied Crypto I

    1. Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
      Pages 130-146
    2. Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
      Pages 147-165
  5. Session 4: Signatures and Friends

    1. Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 183-200
    2. Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao
      Pages 201-219
  6. Session 5: Eclectic Assortment

    1. Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura
      Pages 220-237
    2. Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
      Pages 238-254
    3. Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi
      Pages 255-273
  7. Session 6: Theory

    1. Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
      Pages 274-291
    2. Marc Fischlin, Cristina Onete
      Pages 309-326
  8. Session 7: Encryption

    1. Wenling Wu, Lei Zhang
      Pages 327-344
    2. Cihangir Tezcan, Serge Vaudenay
      Pages 345-358
  9. Session 8: Broadcast Encryption

    1. Paolo D’Arco, Angel L. Perez del Pozo
      Pages 359-376
    2. Duong Hieu Phan, David Pointcheval, Mario Strefler
      Pages 377-394
  10. Session 9: Security Services

    1. Kari Kostiainen, N. Asokan, Alexandra Afanasyeva
      Pages 395-412
    2. Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner et al.
      Pages 431-448
  11. Session 10: Attacks II

    1. Stefan Kölbl, Florian Mendel
      Pages 449-461
    2. Tomer Ashur, Orr Dunkelman
      Pages 462-478
    3. Rishiraj Bhattacharyya, Avradip Mandal
      Pages 479-497
    4. Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto
      Pages 498-513
  12. Session 11: Applied Crypto II

    1. Keith B. Frikken, Hao Yuan, Mikhail J. Atallah
      Pages 514-531
    2. Luan Ibraimi, Svetla Nikova, Pieter Hartel, Willem Jonker
      Pages 532-549
  13. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011.
The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Keywords

anonymity authentication cryptanalysis cryptographic protocols digital signatures multiparty computation secure communication channels

Editors and affiliations

  • Javier Lopez
    • 1
  • Gene Tsudik
    • 2
  1. 1.Computer Science DepartmentUniversity of MalagaMalagaSpain
  2. 2.Department of Computer ScienceUniversity of CaliforniaIrvineUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-21554-4
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21553-7
  • Online ISBN 978-3-642-21554-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site