default search action
5. CANS 2006: Suzhou, China
- David Pointcheval, Yi Mu, Kefei Chen:
Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings. Lecture Notes in Computer Science 4301, Springer 2006, ISBN 3-540-49462-6
Encryption
- Jaimee Brown, Juan Manuel González Nieto, Colin Boyd:
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. 1-18 - Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. 19-36
Key Exchange
- Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. 37-54 - Liming Wang, Chuan-Kun Wu:
Authenticated Group Key Agreement for Multicast. 55-72 - Hongsong Shi, Mingxing He, Zhiguang Qin:
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. 73-89
Authentication and Signatures
- Sven Laur, Kaisa Nyberg:
Efficient Mutual Data Authentication Using Manually Authenticated Strings. 90-107 - Christophe Tartary, Huaxiong Wang:
Achieving Multicast Stream Authentication Using MDS Codes. 108-125 - Sujing Zhou, Dongdai Lin:
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. 126-143
Proxy Signatures
- Feng Cao, Zhenfu Cao:
Security Model of Proxy-Multi Signature Schemes. 144-152 - Rongxing Lu, Zhenfu Cao, Xiaolei Dong:
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. 153-167
Cryptanalysis
- Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. 168-181 - Guan Jie, Zhang Zhongya:
Improved Collision Attack on Reduced Round Camellia. 182-190 - Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski:
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. 191-202
Implementation
- Chester Rebeiro, A. David Selvakumar, A. S. L. Devi:
Bitslice Implementation of AES. 203-212 - Jianqin Zhou, Qiang Zheng:
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3). 213-223
Steganalysis and Watermarking
- Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan:
Steganalysis Based on Differential Statistics. 224-240 - Qutaiba Albluwi, Ibrahim Kamel:
Watermarking Essential Data Structures for Copyright Protection. 241-258
Boolean Functions and Stream Ciphers
- Xiyong Zhang, Hua Guo, Jinjiang Yuan:
A Note of Perfect Nonlinear Functions. 259-269 - Xiaomin Wang, Jiashu Zhang, Wenfang Zhang:
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. 270-285
Intrusion Detection
- Nathalie Dagorn:
Cooperative Intrusion Detection for Web Applications. 286-302 - Jianhua Yang, Byong Lee, Yongzhong Zhang:
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. 303-317 - Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang:
Smart Architecture for High-Speed Intrusion Detection and Prevention Systems. 318-328 - Xianxian Li, Lijun Liu:
A Multi-agent Cooperative Model and System for Integrated Security Monitoring. 329-341
Disponibility and Reliability
- Jian Kang, Yuan Zhang, Jiu-bin Ju:
Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network. 342-353 - Jinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu:
An Immune-Based Model for Service Survivability. 354-363 - Lan Yu, Willy Susilo, Reihaneh Safavi-Naini:
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. 364-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.