did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540769682

Cryptology and Network Security: 6th International Conference, Cans 2007, Singapore, December 8-10, 2007, Proceedings

by ; ; ; ;
  • ISBN13:

    9783540769682

  • ISBN10:

    3540769684

  • Format: Paperback
  • Copyright: 2007-12-20
  • Publisher: Springer Verlag

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $99.00 Save up to $24.75
  • Buy Used
    $74.25
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Table of Contents

Signatures
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oraclesp. 1
A Generic Construction for Universally-Convertible Undeniable Signaturesp. 15
Fast Digital Signature Algorithm Based on Subgraph Isomorphismp. 34
Efficient ID-Based Digital Signatures with Message Recoveryp. 47
Network Security
Achieving Mobility and Anonymity in IP-Based Networksp. 60
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversaryp. 80
Forward-Secure Key Evolution in Wireless Sensor Networksp. 102
A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locationsp. 121
An Intelligent Network-Warning Model with Strong Survivabilityp. 133
Running on Karma - P2P Reputation and Currency Systemsp. 146
Secure Keyword Search and Private Information Retrieval
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryptionp. 159
Extended Private Information Retrieval and Its Application in Biometrics Authenticationsp. 175
Public Key Encryption
Strongly Secure Certificateless Public Key Encryption Without Pairingp. 194
Intrusion Detection
Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systemsp. 209
Email Security
How to Secure Your Email Address Book and Beyondp. 228
Denial of Service Attacks
Toward Non-parallelizable Client Puzzlesp. 247
Authentication
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authenticationp. 265
Author Indexp. 283
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program