default search action
2nd ACNS 2004: Yellow Mountain, China
- Markus Jakobsson, Moti Yung, Jianying Zhou:
Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings. Lecture Notes in Computer Science 3089, Springer 2004, ISBN 3-540-22217-0
Security and Storage
- Michael E. Locasto, Angelos D. Keromytis:
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. 1-15 - Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang:
Private Keyword-Based Push and Pull with Applications to Anonymous Communication. 16-30 - Philippe Golle, Jessica Staddon, Brent R. Waters:
Secure Conjunctive Keyword Search over Encrypted Data. 31-45
Provably Secure Constructions
- Jens Groth:
Evaluating Security of Voting Schemes in the Universal Composability Framework. 46-60 - Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa:
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. 61-75 - Rui Zhang, Goichiro Hanaoka, Hideki Imai:
On the Security of Cryptosystems with All-or-Nothing Transform. 76-90
Internet Security
- Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen:
Centralized Management of Virtual Security Zones in IP Networks. 91-102 - Tao Wan, Evangelos Kranakis, Paul C. van Oorschot:
S-RIP: A Secure Distance Vector Routing Protocol. 103-119 - Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
A Pay-per-Use DoS Protection Mechanism for the Web. 120-134
Digital Signature
- Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Limited Verifier Signature from Bilinear Pairings. 135-148 - Willy Susilo, Yi Mu:
Deniable Ring Authentication Revisited. 149-163 - Atsuko Miyaji, Kozue Umeda:
A Fully-Functional Group Signature Scheme over Only Known-Order Group. 164-179
Security Modelling
- Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu:
Some Observations on Zap and Its Applications. 180-193 - Weiming Zhang, Shiqu Li:
Security Measurements of Steganographic Systems. 194-204 - Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo:
X2Rep: Enhanced Trust Semantics for the XRep Protocol. 205-219
Authenticated Key Exchange
- Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee:
One-Round Protocols for Two-Party Authenticated Key Exchange. 220-232 - Muxiang Zhang:
Password Authenticated Key Exchange Using Quadratic Residues. 233-247 - Colin Boyd, Wenbo Mao, Kenneth G. Paterson:
Key Agreement Using Statically Keyed Authenticators. 248-262
Security of Deployed Systems
- Andrew K. Wright, John A. Kinast, Joe McCarty:
Low-Latency Cryptographic Protection for SCADA Communications. 263-277 - Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin:
A Best Practice for Root CA Key Update in PKI. 278-291 - Stephen W. Boyd, Angelos D. Keromytis:
SQLrand: Preventing SQL Injection Attacks. 292-302
Cryptosystems: Design and Analysis
- Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. 303-309 - Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano:
Success Probability in Chi2-Attacks. 310-325 - Ali Kanso:
More Generalized Clock-Controlled Alternating Step Generator. 326-338
Cryptographic Protocols
- Daisuke Inoue, Masahiro Kuroda:
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. 339-354 - Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. 355-368 - Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. 369-382
Side Channels and Protocol Analysis
- Katsuyuki Okeya, Tsuyoshi Takagi:
Security Analysis of CRT-Based Cryptosystems. 383-397 - Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung:
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. 398-413 - Shuhong Wang, Jie Wang, Maozhi Xu:
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. 414-425
Intrusion Detection and DoS
- Hyung-Woo Lee:
Advanced Packet Marking Mechanism with Pushback for IP Traceback. 426-438 - Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li:
A Parallel Intrusion Detection System for High-Speed Networks. 439-451 - Dong Yu, Deborah A. Frincke:
A Novel Framework for Alert Correlation and Understanding. 452-466
Cryptographic Algorithms
- BaiJie Kuang, Yuefei Zhu, YaJuan Zhang:
An Improved Algorithm for uP + vQ Using JSF13. 467-478 - Palash Sarkar, Pradeep Kumar Mishra, Rana Barua:
New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn). 479-493 - Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. 494-508
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.