default search action
1st ACNS 2003: Kunming, China
- Jianying Zhou, Moti Yung, Yongfei Han:
Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings. Lecture Notes in Computer Science 2846, Springer 2003, ISBN 3-540-20208-0
Cryptographic Applications
- Ventzislav Nikov, Svetla Nikova, Bart Preneel:
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. 1-15 - Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji:
Optimized Chi2-Attack against RC6. 16-32 - Yuko Tamura, Atsuko Miyaji:
Anonymity-Enhanced Pseudonym System. 33-47
Intrusion Detection
- Kwong H. Yung:
Using Feedback to Improve Masquerade Detection. 48-62 - Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun:
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. 63-75 - Fan Min, Jun-yan Zhang, Guo-wie Yang:
An IP Traceback Scheme Integrating DPM and PPM. 76-85
Cryptographic Algorithms
- Sung-Ryul Kim:
Improved Scalable Hash Chain Traversal. 86-95 - Rui Zhang, Hideki Imai:
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. 96-110 - Guilin Wang, Xiaoxi Han, Bo Zhu:
On the Security of Two Threshold Signature Schemes with Traceable Signers. 111-122
Digital Signature
- Mohamed Al-Ibrahim, Anton Cerný:
Proxy and Threshold One-Time Signatures. 123-136 - Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng:
A Threshold GQ Signature Scheme. 137-150 - Gene Itkis, Peng Xie:
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. 151-168 - Chong-zhi Gao, Zheng-an Yao, Lei Li:
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. 169-175
Security Modelling
- Ching Lin, Vijay Varadharajan:
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. 176-190 - Chun Ruan, Vijay Varadharajan:
An Authorization Model for E-consent Requirement in a Health Care Application. 191-205 - Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang:
PLI: A New Framework to Protect Digital Content for P2P Networks. 206-216
Web Security
- Chunyan Bai, Gui Liang Feng:
Improved Algebraic Traitor Tracing Scheme. 217-227 - Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang:
Common Vulnerability Markup Language. 228-240 - Tieyan Li, Yongdong Wu:
Trust on Web Browser: Attack vs. Defense. 241-253
Security Protocols
- Luciano Rila, Chris J. Mitchell:
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. 254-264 - Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park:
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. 265-279 - Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
Using OCSP to Secure Certificate-Using Transactions in M-commerce. 280-292
Cryptanalysis
- Pierre Dusart, Gilles Letourneux, Olivier Vivolo:
Differential Fault Analysis on A.E.S. 293-306 - Roman Novak:
Side-Channel Attack on Substitution Blocks. 307-318 - Yasuyuki Sakai, Kouichi Sakurai:
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. 319-330 - Sarbani Palit, Bimal K. Roy, Arindom De:
A Fast Correlation Attack for LFSR-Based Stream Ciphers. 331-342
Key Management
- Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng:
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. 343-356 - Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu:
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. 357-371 - Taenam Cho, Sang-Ho Lee:
A Key Recovery Mechanism for Reliable Group Key Management. 372-386
Efficient Implementations
- Sandeepan Chowdhury, Subhamoy Maitra:
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model. 387-402 - Dong Jin Kwak, Sang-Jae Moon:
Efficient Distributed Signcryption Scheme as Group Signcryption. 403-417 - Johann Großschädl, Guy-Armand Kamendje:
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. 418-434
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.