Cryptology and Network Security

5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings

Omschrijving

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006. The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability. This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability. Encryption Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems 1(18) Jaimee Brown Juan Manuel Gonzalez Nieto Colin Boyd Efficient Identity-Based Encryption with Tight Security Reduction 19(18) Nuttapong Attrapadung Jun Furukawa Takeshi Gomi Goichiro Hanaoka Hideki Imai Rui Zhang Key Exchange A Diffie-Hellman Key Exchange Protocol Without Random Oracles 37(18) Ik Rae Jeong Jeong Ok Kwon Dong Hoon Lee Authenticated Group Key Agreement for Multicast 55(18) Liming Wang Chuan-Kun Wu Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks 73(17) Hongsong Shi Mingxing He Zhiguang Qin Authentication and Signatures Efficient Mutual Data Authentication Using Manually Authenticated Strings 90(18) Sven Laur Kaisa Nyberg Achieving Multicast Stream Authentication Using MDS Codes 108(18) Christophe Tartary Huaxiong Wang Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps 126(18) Sujing Zhou Dongdai Lin Proxy Signatures Security Model of Proxy-Multi Signature Schemes 144(9) Feng Cao Zhenfu Cao Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque 153(15) Rongxing Lu Zhenfu Cao Xiaolei Dong Cryptanalysis Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields 168(14) Tae Hyun Kim Tsuyoshi Takagi Dong-Guk Han Ho Won Kim Jongin Lim Improved Collision Attack on Reduced Round Camellia 182(9) Jie Guan Zhongya Zhang Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks 191(12) Zbigniew Golebiewski Miroslaw Kutylowski Filip Zagoaski Implementation Bitslice Implementation of AES 203(10) Chester Rebeiro David Selvakumar A.S.L. Devi A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3) 213(11) Jianqin Zhou Qiang Zheng Steganalysis and Watermarking Steganalysis Based on Differential Statistics 224(17) Zugen Liu Lingdi Ping Jian Chen Jimin Wang Xuezeng Pan Watermarking Essential Data Structures for Copyright Protection 241(18) Qutaiba Albluwi Ibrahim Kamel Boolean Functions and Stream Ciphers A Note of Perfect Nonlinear Functions 259(11) Xiyong Zhang Hua Guo Jinjiang Yuan Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing 270(16) Xiaomin Wang Jiashu Zhang Wenfang Zhang Intrusion Detection Cooperative Intrusion Detection for Web Applications 286(17) !Nathalie Dagorn Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis 303(15) Jianhua Yang Byong Lee Yongzhong Zhang Smart Architecture for High-Speed Intrusion Detection and Prevention Systems 318(11) Chih-Chiang Wu Sung-Hua Wen Nen-Fu Huang A Multi-agent Cooperative Model and System for Integrated Security Monitoring 329(13) Xianxian Li Lijun Liu Disponibility and Reliability Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network 342(12) Jian Kang Yuan Zhang Jiu-bin Ju An Immune-Based Model for Service Survivability 354(10) Jinquan Zeng Xiaojie Liu Tao Li Feixian Sun Lingxi Peng Caiming Liu X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks 364(17) Lan Yu Willy Susilo Rei Safavi-Naini Author Index 381
€ 61,20
Paperback
 
Gratis verzending vanaf
€ 19,95 binnen Nederland
Schrijver
Titel
Cryptology and Network Security
Uitgever
Springer-Verlag GmbH
Jaar
2006
Taal
Engels
Pagina's
400
Gewicht
590 gr
EAN
9783540494621
Afmetingen
235 x 152 x 25 mm
Bindwijze
Paperback

U ontvangt bij ons altijd de laatste druk!


Rubrieken

Boekstra