Skip to main content
  • Conference proceedings
  • © 2005

Applied Cryptography and Network Security

Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3531)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2005.

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-31542-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (35 papers)

  1. Front Matter

  2. Two-Server Password-Only Authenticated Key Exchange

    • Jonathan Katz, Philip MacKenzie, Gelareh Taban, Virgil Gligor
    Pages 1-16
  3. Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks

    • Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
    Pages 17-32
  4. Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution

    • Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Pages 40-55
  5. A Traitor Tracing Scheme Based on RSA for Fast Decryption

    • John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
    Pages 56-74
  6. Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management

    • Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji
    Pages 104-121
  7. Searching for High-Value Rare Events with Uncheatable Grid Computing

    • Wenliang Du, Michael T. Goodrich
    Pages 122-137
  8. Digital Signatures Do Not Guarantee Exclusive Ownership

    • Thomas Pornin, Julien P. Stern
    Pages 138-150
  9. Thompson’s Group and Public Key Cryptography

    • Vladimir Shpilrain, Alexander Ushakov
    Pages 151-163
  10. Rainbow, a New Multivariable Polynomial Signature Scheme

    • Jintai Ding, Dieter Schmidt
    Pages 164-175
  11. Badger – A Fast and Provably Secure MAC

    • Martin Boesgaard, Thomas Christensen, Erik Zenner
    Pages 176-191
  12. IDS False Alarm Reduction Using Continuous and Discontinuous Patterns

    • Abdulrahman Alharby, Hideki Imai
    Pages 192-205
  13. Indexing Information for Data Forensics

    • Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia
    Pages 206-221
  14. Model Generalization and Its Implications on Intrusion Detection

    • Zhuowei Li, Amitabha Das, Jianying Zhou
    Pages 222-237
  15. Intrusion-Resilient Secure Channels

    • Gene Itkis, Robert McNerney Jr., Scott Russell
    Pages 238-253
  16. Optimal Asymmetric Encryption and Signature Paddings

    • Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
    Pages 254-268
  17. Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA

    • SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Pages 269-284

Other Volumes

  1. Applied Cryptography and Network Security

    Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings

About this book

The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association). It was held at Columbia University in New York, USA, June 7–10, 2005. This conference proceedings volume contains papers presented in the academic/research track. ACNS covers a large number of research areas that have been gaining importance in recent years due to the development of the Internet, wireless communication and the increased global exposure of computing resources. The papers in this volume are representative of the state of the art in security and cryptography research, worldwide. The Program Committee of the conference received a total of 158 submissions from all over the world, of which 35 submissions were selected for presentation at the a- demic track. In addition to this track, the conference also hosted a technical/ industrial/ short papers track whose presentations were also carefully selected from among the submissions. All submissions were reviewed by experts in the relevant areas.

Keywords

  • DES
  • Denial of Service
  • Information
  • Oracle
  • PKC
  • RSA
  • Web security
  • Web service security
  • authentication
  • communications security
  • cryptography
  • multi-party encryption
  • network security
  • secure networking
  • security

Editors and Affiliations

  • AT&T Labs – Research,  

    John Ioannidis

  • Computer Science Department, Columbia University,  

    Angelos Keromytis

  • Computer Science Department, Google Inc. and Columbia University, New York, NY, USA

    Moti Yung

Bibliographic Information

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-31542-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)