My Account Log in

1 option

Applied Cryptography and Network Security : 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings / edited by Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Abdalla, Michel, editor.
Pointcheval, David, editor.
Fouque, Pierre-Alain, editor.
Vergnaud, Damien, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 5536.
Security and Cryptology ; 5536
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Computer security.
Application software.
Coding theory.
Information theory.
Data structures (Computer science).
Cryptology.
Computer Communication Networks.
Systems and Data Security.
Information Systems Applications (incl. Internet).
Coding and Information Theory.
Data Structures and Information Theory.
Local Subjects:
Cryptology.
Computer Communication Networks.
Systems and Data Security.
Information Systems Applications (incl. Internet).
Coding and Information Theory.
Data Structures and Information Theory.
Physical Description:
1 online resource (XIII, 535 pages).
Edition:
First edition 2009.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
Contents:
Key Exchange
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Secure Computation
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
Practical Secure Evaluation of Semi-private Functions
Secure Hamming Distance Based Computation and Its Applications
Efficient Robust Private Set Intersection
Public-Key Encryption
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
An Efficient Identity-Based Online/Offline Encryption Scheme
Dual-Policy Attribute Based Encryption
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
Network Security I
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Traitor Tracing
Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size
Tracing and Revoking Pirate Rebroadcasts
Authentication and Anonymity
Efficient Deniable Authentication for Signatures
Homomorphic MACs: MAC-Based Integrity for Network Coding
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Hash Functions
Cryptanalysis of Twister
Cryptanalysis of CubeHash
Collision Attack on Boole
Network Security II
Integrity Protection for Revision Control
Fragility of the Robust Security Network: 802.11 Denial of Service
Fast Packet Classification Using Condition Factorization
Lattices
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches
Broadcast Attacks against Lattice-Based Cryptosystems
Partial Key Exposure Attack on CRT-RSA
Side-Channel Attacks
How to Compare Profiled Side-Channel Attacks?
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
Attacking ECDSA-Enabled RFID Devices.
Other Format:
Printed edition:
ISBN:
978-3-642-01957-9
9783642019579
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account