
×
Cryptology and Network Security
4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
herausgegeben von Yvo G. Desmedt, Huaxiong Wang, Yi Mu und Yongqing LiInhaltsverzeichnis
- Cryptanalysis.
- The Second-Preimage Attack on MD4.
- On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.
- Security Analysis of Password-Authenticated Key Agreement Protocols.
- Intrusion Detection and Viruses.
- An Immune-Based Model for Computer Virus Detection.
- A New Model for Dynamic Intrusion Detection.
- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.
- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.
- Authentication and Signature.
- ID-Based Aggregate Signatures from Bilinear Pairings.
- Efficient Identity-Based Signatures and Blind Signatures.
- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.
- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.
- Signcryption.
- Two Proxy Signcryption Schemes from Bilinear Pairings.
- Constructing Secure Warrant-Based Proxy Signcryption Schemes.
- E-mail Security.
- Design and Implementation of an Inline Certified E-mail Service.
- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.
- Cryptosystems.
- Similar Keys of Multivariate Quadratic Public Key Cryptosystems.
- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.
- Constructions of Almost Resilient Functions.
- Privacy and Tracing.
- A Novel Method to Maintain Privacy in Mobile Agent Applications.
- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.
- Information Hiding.
- Revaluation of Error Correcting Coding in Watermarking Channel.
- Firewalls, Denial of Service and DNS Security.
- On the Performance and Analysis of DNS Security Extensions.
- On Securing RTP-Based Streaming Content with Firewalls.
- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.
- Trust Management.
- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.