default search action
4. CANS 2005: Xiamen, China
- Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li:
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings. Lecture Notes in Computer Science 3810, Springer 2005, ISBN 3-540-30849-0
Cryptanalysis
- Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang:
The Second-Preimage Attack on MD4. 1-12 - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. 13-25 - Haiyong Bao, Zhenfu Cao, Haifeng Qian:
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. 26-34 - Wen Tao Zhu:
Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. 35-48 - Kyung-Ah Shim, Seung-Hyun Seo:
Security Analysis of Password-Authenticated Key Agreement Protocols. 49-58
Intrusion Detection and Viruses
- Tao Li, XiaoJie Liu, Hongbin Li:
An Immune-Based Model for Computer Virus Detection. 59-71 - Tao Li, XiaoJie Liu, Hongbin Li:
A New Model for Dynamic Intrusion Detection. 72-84 - Ruo Ando, Yoshiyasu Takefuji:
Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. 85-95 - Wei Lu, Issa Traoré:
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time. 96-109
Authentication and Signature
- Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Aggregate Signatures from Bilinear Pairings. 110-119 - Zhenjie Huang, Kefei Chen, Yumin Wang:
Efficient Identity-Based Signatures and Blind Signatures. 120-133 - Chong-zhi Gao, Zheng-an Yao:
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. 134-146 - Eun-Jun Yoon, Kee-Young Yoo:
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. 147-160
Signcryption
- Qin Wang, Zhenfu Cao:
Two Proxy Signcryption Schemes from Bilinear Pairings. 161-171 - Yuan Zhou, Zhenfu Cao, Rongxing Lu:
Constructing Secure Warrant-Based Proxy Signcryption Schemes. 172-185
E-mail Security
- Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco:
Design and Implementation of an Inline Certified E-mail Service. 186-199 - Zhenfeng Zhang, Jing Xu, Dengguo Feng:
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. 200-210
Cryptosystems
- Yuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai:
Similar Keys of Multivariate Quadratic Public Key Cryptosystems. 211-222 - Fanyu Kong, Daxing Li:
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. 223-235 - Pinhui Ke, Tailin Liu, Qiao-Yan Wen:
Constructions of Almost Resilient Functions. 236-246
Privacy and Tracing
- Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López:
A Novel Method to Maintain Privacy in Mobile Agent Applications. 247-260 - Lasse Øverlier, Tønnes Brekne, André Årnes:
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. 261-273
Information Hiding
- Limin Gu, Yanmei Fang, Jiwu Huang:
Revaluation of Error Correcting Coding in Watermarking Channel. 274-287
Firewalls, Denial of Service and DNS Security
- Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese:
On the Performance and Analysis of DNS Security Extensions. 288-303 - Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo:
On Securing RTP-Based Streaming Content with Firewalls. 304-319 - Yang Xiang, Wanlei Zhou:
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. 320-333
Trust Management
- Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao:
Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. 334-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.