6. ACNS 2008:
New York,
NY,
USA
Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung (Eds.):
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings.
Lecture Notes in Computer Science 5037 2008, ISBN 978-3-540-68913-3 BibTeX
- Liang Xie, Hui Song, Sencun Zhu:
On the Effectiveness of Internal Patching Against File-Sharing Worms.
1-20
Electronic Edition (link) BibTeX
- Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos:
Peeking Through the Cloud: DNS-Based Estimation and Its Applications.
21-38
Electronic Edition (link) BibTeX
- Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
Pushback for Overlay Networks: Protecting Against Malicious Insiders.
39-54
Electronic Edition (link) BibTeX
- Patrick P. Tsang, Sean W. Smith:
PPAA: Peer-to-Peer Anonymous Authentication.
55-74
Electronic Edition (link) BibTeX
- Joonsang Baek, Jianying Zhou, Feng Bao:
Generic Constructions of Stateful Public Key Encryption and Their Applications.
75-93
Electronic Edition (link) BibTeX
- Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Traceable and Retrievable Identity-Based Encryption.
94-110
Electronic Edition (link) BibTeX
- Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta:
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures.
111-129
Electronic Edition (link) BibTeX
- Somitra Kumar Sanadhya, Palash Sarkar:
Attacking Reduced Round SHA-256.
130-143
Electronic Edition (link) BibTeX
- Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen:
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography.
144-155
Electronic Edition (link) BibTeX
- Yevgeniy Dodis, Prashant Puniya:
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.
156-173
Electronic Edition (link) BibTeX
- Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Replay Attack in a Fair Exchange Protocol.
174-187
Electronic Edition (link) BibTeX
- Marina Blanton:
Improved Conditional E-Payments.
188-206
Electronic Edition (link) BibTeX
- Sébastien Canard, Aline Gouget:
Anonymity in Transferable E-cash.
207-223
Electronic Edition (link) BibTeX
- Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures.
224-241
Electronic Edition (link) BibTeX
- Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow.
242-257
Electronic Edition (link) BibTeX
- Sébastien Canard, Fabien Laguillaumie, Michel Milhau:
TrapdoorSanitizable Signatures and Their Application to Content Protection.
258-276
Electronic Edition (link) BibTeX
- David Pointcheval, Sébastien Zimmer:
Multi-factor Authenticated Key Exchange.
277-295
Electronic Edition (link) BibTeX
- Marek Klonowski, Miroslaw Kutylowski, Anna Lauks:
Repelling Detour Attack Against Onions with Re-encryption.
296-308
Electronic Edition (link) BibTeX
- John C. Mitchell, Arnab Roy, Paul Rowe, Andre Scedrov:
Analysis of EAP-GPSK Authentication Protocol.
309-327
Electronic Edition (link) BibTeX
- Ramnath Prasad, Nitesh Saxena:
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns.
328-345
Electronic Edition (link) BibTeX
- Ghaith Hammouri, Berk Sunar:
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.
346-365
Electronic Edition (link) BibTeX
- Vladimir Shpilrain, Alexander Ushakov:
An Authentication Scheme Based on the Twisted Conjugacy Problem.
366-372
Electronic Edition (link) BibTeX
- Nikita Borisov, Soumyadeb Mitra:
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.
373-391
Electronic Edition (link) BibTeX
- Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen:
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation.
392-410
Electronic Edition (link) BibTeX
- Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer:
On the Security of the CCM Encryption Mode and of a Slight Variant.
411-428
Electronic Edition (link) BibTeX
- Brian King:
wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm.
429-445
Electronic Edition (link) BibTeX
- D. Canright, Lejla Batina:
A Very Compact "Perfectly Masked" S-Box for AES.
446-459
Electronic Edition (link) BibTeX
- Frank Stajano, Daniel Cvrcek, Matt Lewis:
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks.
460-478
Electronic Edition (link) BibTeX
- Khaled Ouafi, Raphael C.-W. Phan:
Traceable Privacy of Recent Provably-Secure RFID Protocols.
479-489
Electronic Edition (link) BibTeX
- Mike Burmester, Breno de Medeiros:
The Security of EPC Gen2 Compliant RFID Protocols.
490-506
Electronic Edition (link) BibTeX
Copyright © Sat May 16 22:56:05 2009
by Michael Ley (ley@uni-trier.de)