Cryptology and Network Security | 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings | ISBN 9783540494621

Cryptology and Network Security

5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings

herausgegeben von David Pointcheval, Yi Mu und Kefei Chen
Mitwirkende
Herausgegeben vonDavid Pointcheval
Herausgegeben vonYi Mu
Herausgegeben vonKefei Chen
Buchcover Cryptology and Network Security  | EAN 9783540494621 | ISBN 3-540-49462-6 | ISBN 978-3-540-49462-1

Cryptology and Network Security

5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings

herausgegeben von David Pointcheval, Yi Mu und Kefei Chen
Mitwirkende
Herausgegeben vonDavid Pointcheval
Herausgegeben vonYi Mu
Herausgegeben vonKefei Chen

Inhaltsverzeichnis

  • Encryption.
  • Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.
  • Efficient Identity-Based Encryption with Tight Security Reduction.
  • Key Exchange.
  • A Diffie-Hellman Key Exchange Protocol Without Random Oracles.
  • Authenticated Group Key Agreement for Multicast.
  • Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.
  • Authentication and Signatures.
  • Efficient Mutual Data Authentication Using Manually Authenticated Strings.
  • Achieving Multicast Stream Authentication Using MDS Codes.
  • Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.
  • Proxy Signatures.
  • Security Model of Proxy-Multi Signature Schemes.
  • Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
  • Cryptanalysis.
  • Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
  • Improved Collision Attack on Reduced Round Camellia.
  • Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks.
  • Implementation.
  • Bitslice Implementation of AES.
  • A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3).
  • Steganalysis and Watermarking.
  • Steganalysis Based on Differential Statistics.
  • Watermarking Essential Data Structures for Copyright Protection.
  • Boolean Functions and Stream Ciphers.
  • A Note of Perfect Nonlinear Functions.
  • Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.
  • Intrusion Detection.
  • Cooperative Intrusion Detection for Web Applications.
  • Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.
  • Smart Architecture for High-Speed Intrusion Detection and Prevention Systems.
  • A Multi-agent Cooperative Model and System for Integrated Security Monitoring.
  • Disponibility and Reliability.
  • Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network.
  • An Immune-Based Model for Service Survivability.
  • X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.