Articoli correlati a Applied Cryptography and Network Security: 8th International...

Applied Cryptography and Network Security: 8th International Conference, Acns 2010 Beijing, China, June 22-25, 2010 Proceedings: 6123 - Brossura

 
9783642137075: Applied Cryptography and Network Security: 8th International Conference, Acns 2010 Beijing, China, June 22-25, 2010 Proceedings: 6123

Sinossi

ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Contenuti

Public Key Encryption.- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption.- How to Construct Interval Encryption from Binary Tree Encryption.- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions.- Digital Signature.- Trapdoor Sanitizable Signatures Made Easy.- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.- Redactable Signatures for Tree-Structured Data: Definitions and Constructions.- Block Ciphers and Hash Functions.- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions.- Multi-trail Statistical Saturation Attacks.- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G???.- High Performance GHASH Function for Long Messages.- Side-Channel Attacks.- Principles on the Security of AES against First and Second-Order Differential Power Analysis.- Adaptive Chosen-Message Side-Channel Attacks.- Secure Multiplicative Masking of Power Functions.- Zero Knowledge and Multi-party Protocols.- Batch Groth–Sahai.- Efficient and Secure Evaluation of Multivariate Polynomials and Applications.- Efficient Implementation of the Orlandi Protocol.- Improving the Round Complexity of Traitor Tracing Schemes.- Key Management.- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.- Deniable Internet Key Exchange.- Authentication and Identification.- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm.- Secure Sketch for Multiple Secrets.- A Message Recognition Protocol Based on Standard Assumptions.- Privacy and Anonymity.- Affiliation-Hiding Key Exchange with Untrusted Group Authorities.- Privacy-Preserving Group Discovery with Linear Complexity.- Two New Efficient PIR-Writing Protocols.- Regulatory Compliant Oblivious RAM.- RFID Security and Privacy.- Revisiting Unpredictability-Based RFID Privacy Models.- On RFID Privacy with Mutual Authentication and Tag Corruption.- Internet Security.- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.- COP: A Step toward Children Online Privacy.- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Compra usato

Condizioni: ottimo
Zustand: Sehr gut | Sprache: Englisch...
Visualizza questo articolo

GRATIS per la spedizione da Germania a Italia

Destinazione, tempi e costi

Altre edizioni note dello stesso titolo

9783642137099: Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings

Edizione in evidenza

ISBN 10:  3642137091 ISBN 13:  9783642137099
Casa editrice: Springer, 2011
Brossura

Risultati della ricerca per Applied Cryptography and Network Security: 8th International...

Foto dell'editore

Unbekannt
Editore: Springer-Verlag GmbH, 2010
ISBN 10: 3642137075 ISBN 13: 9783642137075
Antico o usato Brossura

Da: Buchpark, Trebbin, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher. Codice articolo 7839650/12

Contatta il venditore

Compra usato

EUR 93,20
Convertire valuta
Spese di spedizione: GRATIS
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Unbekannt
Editore: Springer-Verlag GmbH, 2010
ISBN 10: 3642137075 ISBN 13: 9783642137075
Antico o usato Brossura

Da: Buchpark, Trebbin, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Hervorragend. Zustand: Hervorragend | Sprache: Englisch | Produktart: Bücher. Codice articolo 7839650/1

Contatta il venditore

Compra usato

EUR 93,20
Convertire valuta
Spese di spedizione: GRATIS
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Zhou, Jianying; Yung, Moti
ISBN 10: 3642137075 ISBN 13: 9783642137075
Antico o usato Trade Paperback

Da: Smith Family Bookstore Downtown, Eugene, OR, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Trade Paperback. Condizione: Very Good. Text clean and unmarked. Binding tight. Covers have light wear along edges. Corner tips of upper corners lightly bent. Edges of pages have light wear. Codice articolo 5051647

Contatta il venditore

Compra usato

EUR 87,92
Convertire valuta
Spese di spedizione: EUR 66,58
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello