default search action
6th ACNS 2008: New York, NY, USA
- Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Lecture Notes in Computer Science 5037, 2008, ISBN 978-3-540-68913-3 - Liang Xie, Hui Song, Sencun Zhu:
On the Effectiveness of Internal Patching Against File-Sharing Worms. 1-20 - Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos:
Peeking Through the Cloud: DNS-Based Estimation and Its Applications. 21-38 - Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
Pushback for Overlay Networks: Protecting Against Malicious Insiders. 39-54 - Patrick P. Tsang, Sean W. Smith:
PPAA: Peer-to-Peer Anonymous Authentication. 55-74 - Joonsang Baek, Jianying Zhou, Feng Bao:
Generic Constructions of Stateful Public Key Encryption and Their Applications. 75-93 - Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Traceable and Retrievable Identity-Based Encryption. 94-110 - Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta:
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. 111-129 - Somitra Kumar Sanadhya, Palash Sarkar:
Attacking Reduced Round SHA-256. 130-143 - Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen:
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. 144-155 - Yevgeniy Dodis, Prashant Puniya:
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. 156-173 - Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Replay Attack in a Fair Exchange Protocol. 174-187 - Marina Blanton:
Improved Conditional E-Payments. 188-206 - Sébastien Canard, Aline Gouget:
Anonymity in Transferable E-cash. 207-223 - Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures. 224-241 - Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow. 242-257 - Sébastien Canard, Fabien Laguillaumie, Michel Milhau:
TrapdoorSanitizable Signatures and Their Application to Content Protection. 258-276 - David Pointcheval, Sébastien Zimmer:
Multi-factor Authenticated Key Exchange. 277-295 - Marek Klonowski, Miroslaw Kutylowski, Anna Lauks:
Repelling Detour Attack Against Onions with Re-encryption. 296-308 - John C. Mitchell, Arnab Roy, Paul D. Rowe, Andre Scedrov:
Analysis of EAP-GPSK Authentication Protocol. 309-327 - Ramnath Prasad, Nitesh Saxena:
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. 328-345 - Ghaith Hammouri, Berk Sunar:
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. 346-365 - Vladimir Shpilrain, Alexander Ushakov:
An Authentication Scheme Based on the Twisted Conjugacy Problem. 366-372 - Nikita Borisov, Soumyadeb Mitra:
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. 373-391 - Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen:
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. 392-410 - Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer:
On the Security of the CCM Encryption Mode and of a Slight Variant. 411-428 - Brian King:
wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. 429-445 - David Canright, Lejla Batina:
A Very Compact "Perfectly Masked" S-Box for AES. 446-459 - Frank Stajano, Daniel Cvrcek, Matt Lewis:
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. 460-478 - Khaled Ouafi, Raphael C.-W. Phan:
Traceable Privacy of Recent Provably-Secure RFID Protocols. 479-489 - Mike Burmester, Breno de Medeiros:
The Security of EPC Gen2 Compliant RFID Protocols. 490-506
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.