Cryptology and Network Security -

Cryptology and Network Security

5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings
Buch | Softcover
XIII, 384 Seiten
2006 | 2006
Springer Berlin (Verlag)
978-3-540-49462-1 (ISBN)
53,49 inkl. MwSt
lt;p>This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.

Encryption.- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.- Efficient Identity-Based Encryption with Tight Security Reduction.- Key Exchange.- A Diffie-Hellman Key Exchange Protocol Without Random Oracles.- Authenticated Group Key Agreement for Multicast.- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.- Authentication and Signatures.- Efficient Mutual Data Authentication Using Manually Authenticated Strings.- Achieving Multicast Stream Authentication Using MDS Codes.- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.- Proxy Signatures.- Security Model of Proxy-Multi Signature Schemes.- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.- Cryptanalysis.- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.- Improved Collision Attack on Reduced Round Camellia.- Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.- Implementation.- Bitslice Implementation of AES.- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3).- Steganalysis and Watermarking.- Steganalysis Based on Differential Statistics.- Watermarking Essential Data Structures for Copyright Protection.- Boolean Functions and Stream Ciphers.- A Note of Perfect Nonlinear Functions.- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.- Intrusion Detection.- Cooperative Intrusion Detection for Web Applications.- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems.- A Multi-agent Cooperative Model and System for Integrated Security Monitoring.- Disponibility and Reliability.-Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network.- An Immune-Based Model for Service Survivability.- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.

Erscheint lt. Verlag 27.11.2006
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XIII, 384 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 603 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte aes • algorithm • Algorithm analysis and problem complexity • algorithms • authentication • Communication • cryotanalysis • cryptographics • Cryptology • DDoS attacks • Distributed denial of service • Encryption • Information Hiding • Intrusion Detection • IP traffic tracing • Key Management • multicast security • Networks • secure computation • secure proxy • security • side channel attacks • signature schemes • signcryption • steganalysis • Stream Ciphers • Trust • trust management • Watermarking
ISBN-10 3-540-49462-6 / 3540494626
ISBN-13 978-3-540-49462-1 / 9783540494621
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich