6. CANS 2007:
Singapore
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing (Eds.):
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings.
Lecture Notes in Computer Science 4856 Springer 2007, ISBN 978-3-540-76968-2 BibTeX
Signatures
- Fuchun Guo, Yi Mu, Zhide Chen:
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.
1-14
Electronic Edition (link) BibTeX
- Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu:
A Generic Construction for Universally-Convertible Undeniable Signatures.
15-33
Electronic Edition (link) BibTeX
- Loránd Szöllösi, Tamás Marosits, Gábor Fehér, András Recski:
Fast Digital Signature Algorithm Based on Subgraph Isomorphism.
34-46
Electronic Edition (link) BibTeX
- Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
Efficient ID-Based Digital Signatures with Message Recovery.
47-59
Electronic Edition (link) BibTeX
Network Security
- Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini:
Achieving Mobility and Anonymity in IP-Based Networks.
60-79
Electronic Edition (link) BibTeX
- Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.
80-101
Electronic Edition (link) BibTeX
- Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Forward-Secure Key Evolution in Wireless Sensor Networks.
102-120
Electronic Edition (link) BibTeX
- Jihwan Lim, Sangjin Kim, Heekuck Oh:
A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations.
121-132
Electronic Edition (link) BibTeX
- Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin:
An Intelligent Network-Warning Model with Strong Survivability.
133-145
Electronic Edition (link) BibTeX
- Sherman S. M. Chow:
Running on Karma - P2P Reputation and Currency Systems.
146-158
Electronic Edition (link) BibTeX
Secure Keyword Search and Private Information Retrieval
Public Key Encryption
Intrusion Detection
Email Security
Denial of Service Attacks
Authentication
Copyright © Sat May 16 23:00:22 2009
by Michael Ley (ley@uni-trier.de)