2. ACNS 2004:
Yellow Mountain,
China
Markus Jakobsson, Moti Yung, Jianying Zhou (Eds.):
Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings.
Lecture Notes in Computer Science 3089 Springer 2004, ISBN 3-540-22217-0 BibTeX
@proceedings{DBLP:conf/acns/2004,
editor = {Markus Jakobsson and
Moti Yung and
Jianying Zhou},
title = {Applied Cryptography and Network Security, Second International
Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004,
Proceedings},
booktitle = {ACNS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {3089},
year = {2004},
isbn = {3-540-22217-0},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Security and Storage
Provably Secure Constructions
Internet Security
Digital Signature
Security Modelling
Authenticated Key Exchange
Security of Deployed Systems
Cryptosystems:
Design and Analysis
Cryptographic Protocols
- Daisuke Inoue, Masahiro Kuroda:
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy.
339-354
Electronic Edition (link) BibTeX
- Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
355-368
Electronic Edition (link) BibTeX
- Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
369-382
Electronic Edition (link) BibTeX
Side Channels and Protocol Analysis
Intrusion Detection and DoS
Cryptographic Algorithms
Copyright © Sat May 16 22:56:06 2009
by Michael Ley (ley@uni-trier.de)