Applied Cryptography and Network Security

9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings

  • Javier Lopez
  • Gene Tsudik
Conference proceedings ACNS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6715)

Table of contents

  1. Front Matter
  2. Session 1: Malware and Intrusion Detection

    1. Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo
      Pages 1-18
    2. Ashwin Chaugule, Zhi Xu, Sencun Zhu
      Pages 19-37
    3. Mansoor Alicherry, Angelos D. Keromytis
      Pages 38-56
  3. Session 2: Attacks I

    1. Martin Albrecht, Carlos Cid
      Pages 57-72
    2. Alex Biryukov, Ilya Kizhvatov, Bin Zhang
      Pages 91-109
    3. Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux
      Pages 110-129
  4. Session 3: Applied Crypto I

    1. Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
      Pages 130-146
    2. Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
      Pages 147-165
  5. Session 4: Signatures and Friends

    1. Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 183-200
    2. Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao
      Pages 201-219
  6. Session 5: Eclectic Assortment

    1. Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura
      Pages 220-237
    2. Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
      Pages 238-254
    3. Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi
      Pages 255-273
  7. Session 6: Theory

    1. Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
      Pages 274-291
    2. Marc Fischlin, Cristina Onete
      Pages 309-326
  8. Session 7: Encryption

    1. Wenling Wu, Lei Zhang
      Pages 327-344

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011.
The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Keywords

anonymity authentication cryptanalysis cryptographic protocols digital signatures multiparty computation secure communication channels

Editors and affiliations

  • Javier Lopez
    • 1
  • Gene Tsudik
    • 2
  1. 1.Computer Science DepartmentUniversity of MalagaMalagaSpain
  2. 2.Department of Computer ScienceUniversity of CaliforniaIrvineUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-21554-4
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21553-7
  • Online ISBN 978-3-642-21554-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book