default search action
4th ACNS 2006: Singapore
- Jianying Zhou, Moti Yung, Feng Bao:
Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings. Lecture Notes in Computer Science 3989, 2006, ISBN 3-540-34703-8
Intrusion Avoidance and Detection
- Ahren Studer, Chenxi Wang:
Adaptive Detection of Local Scanners. 1-17 - Jianhua Yang, Yongzhong Zhang:
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. 18-32 - Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough:
DSO: Dependable Signing Overlay. 33-49
Cryptographic Applications
- Ahto Buldas, Sven Laur:
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? 50-65 - Sébastien Canard, Aline Gouget, Emeline Hufschmitt:
A Handy Multi-coupon System. 66-81 - Dongvu Tonien, Reihaneh Safavi-Naini:
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. 82-97
DoS: Attacks and Countermeasures
- Sujata Doshi, Fabian Monrose, Aviel D. Rubin:
Efficient Memory Bound Puzzles Using Pattern Databases. 98-113 - Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam:
Effect of Malicious Synchronization. 114-129 - Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos:
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. 130-145
Key Management
- Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd:
Password Based Server Aided Key Exchange . 146-161 - Qiang Tang, Kim-Kwang Raymond Choo:
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. 162-177 - Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm:
Stateful Subset Cover. 178-193
Cryptanalysis
- Khoongming Khoo, Guang Gong, Hian-Kiat Lee:
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. 194-209 - Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding:
Breaking a New Instance of TTM Cryptosystems. 210-225 - Raphael C.-W. Phan, Bok-Min Goi:
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. 226-238
Security of Limited Devices
- Christoph Herbst, Elisabeth Oswald, Stefan Mangard:
An AES Smart Card Implementation Resistant to Power Analysis Attacks. 239-252 - Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi:
Physical Security Bounds Against Tampering. 253-267 - Camille Vuillaume, Katsuyuki Okeya:
Flexible Exponentiation with Resistance to Side Channel Attacks. 268-283
Cryptography
- Dayin Wang, Dongdai Lin, Wenling Wu:
An Improved Poly1305 MAC. 284-292 - Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng:
Certificateless Public-Key Signature: Security Model and Efficient Construction. 293-308 - Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi:
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. 309-324
Authentication and Web Security
- Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes. 325-339 - Xinghua Li, Sang-Jae Moon, Jianfeng Ma:
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. 340-348 - Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
W3Bcrypt: Encryption as a Stylesheet. 349-364
Ad Hoc and Sensor Network Security
- Dibyendu Chakrabarti, Jennifer Seberry:
Combinatorial Structures for Design of Wireless Sensor Networks. 365-374 - Nitesh Saxena:
Public Key Cryptography Sans Certificates in Ad Hoc Networks. 375-389 - JongHyup Lee, Taekyoung Kwon, JooSeok Song:
Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. 390-404
Cryptographic Constructions
- Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal:
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. 405-420 - Pinhui Ke, Jie Zhang, Qiaoyan Wen:
Results on Almost Resilient Functions. 421-432 - Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen:
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. 433-447
Security and Privacy
- Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi:
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. 448-458 - Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka:
Improving the Randomized Initial Point Countermeasure Against DPA. 459-469 - Aggelos Kiayias, Antonina Mitrofanova:
Syntax-Driven Private Evaluation of Quantified Membership Queries. 470-485
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.