did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540689133

Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008: Proceedings

by ; ; ;
  • ISBN13:

    9783540689133

  • ISBN10:

    3540689133

  • Format: Paperback
  • Copyright: 2008-08-03
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00

Summary

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.

Table of Contents

On the Effectiveness of Internal Patching Against File-Sharing Wormsp. 1
Peeking Through the Cloud: DNS-Based Estimation and Its Applicationsp. 21
Pushback for Overlay Networks: Protecting Against Malicious Insidersp. 39
PPAA: Peer-to-Peer Anonymous Authenticationp. 55
Generic Constructions of Stateful Public Key Encryption and Their Applicationsp. 75
Traceable and Retrievable Identity-Based Encryptionp. 94
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structuresp. 111
Attacking Reduced Round SHA-256p. 130
DAKOTA - Hashing from a Combination of Modular Arithmetic and Symmetric Cryptographyp. 144
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?p. 156
Replay Attack in a Fair Exchange Protocolp. 174
Improved Conditional E-Paymentsp. 188
Anonymity in Transferable E-cashp. 207
Generic Security-Amplifying Methods of Ordinary Digital Signaturesp. 224
New Differential-Algebraic Attacks and Reparametrization of Rainbowp. 242
Trapdoor Sanitizable Signatures and Their Application to Content Protectionp. 258
Multi-factor Authenticated Key Exchangep. 277
Repelling Detour Attack Against Onions with Re-encryptionp. 296
Analysis of EAP-GPSK Authentication Protocolp. 309
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patternsp. 328
PUF-HB: A Tamper-Resilient HB Based Authentication Protocolp. 346
An Authentication Scheme Based on the Twisted Conjugacy Problemp. 366
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliancep. 373
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validationp. 392
On the Security of the CCM Encryption Mode and of a Slight Variantp. 411
wN AF*, an Efficient Left-to-Right Signed Digit Recoding Algorithmp. 429
A Very Compact "Perfectly Masked" S-Box for AESp. 446
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networksp. 460
Traceable Privacy of Recent Provably-Secure RFID Protocolsp. 479
The Security of EPC Gen2 Compliant RFID Protocolsp. 490
Author Indexp. 507
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program