


default search action
2nd ACNS 2004: Yellow Mountain, China
- Markus Jakobsson, Moti Yung, Jianying Zhou:

Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings. Lecture Notes in Computer Science 3089, Springer 2004, ISBN 3-540-22217-0
Security and Storage
- Michael E. Locasto, Angelos D. Keromytis:

CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. 1-15 - Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang:

Private Keyword-Based Push and Pull with Applications to Anonymous Communication. 16-30 - Philippe Golle, Jessica Staddon, Brent R. Waters:

Secure Conjunctive Keyword Search over Encrypted Data. 31-45
Provably Secure Constructions
- Jens Groth

:
Evaluating Security of Voting Schemes in the Universal Composability Framework. 46-60 - Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa:

Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. 61-75 - Rui Zhang, Goichiro Hanaoka, Hideki Imai:

On the Security of Cryptosystems with All-or-Nothing Transform. 76-90
Internet Security
- Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen:

Centralized Management of Virtual Security Zones in IP Networks. 91-102 - Tao Wan, Evangelos Kranakis, Paul C. van Oorschot

:
S-RIP: A Secure Distance Vector Routing Protocol. 103-119 - Angelos Stavrou

, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
A Pay-per-Use DoS Protection Mechanism for the Web. 120-134
Digital Signature
- Xiaofeng Chen, Fangguo Zhang

, Kwangjo Kim:
Limited Verifier Signature from Bilinear Pairings. 135-148 - Willy Susilo

, Yi Mu:
Deniable Ring Authentication Revisited. 149-163 - Atsuko Miyaji

, Kozue Umeda:
A Fully-Functional Group Signature Scheme over Only Known-Order Group. 164-179
Security Modelling
- Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu:

Some Observations on Zap and Its Applications. 180-193 - Weiming Zhang, Shiqu Li:

Security Measurements of Steganographic Systems. 194-204 - Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo

:
X2Rep: Enhanced Trust Semantics for the XRep Protocol. 205-219
Authenticated Key Exchange
- Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee:

One-Round Protocols for Two-Party Authenticated Key Exchange. 220-232 - Muxiang Zhang:

Password Authenticated Key Exchange Using Quadratic Residues. 233-247 - Colin Boyd, Wenbo Mao, Kenneth G. Paterson:

Key Agreement Using Statically Keyed Authenticators. 248-262
Security of Deployed Systems
- Andrew K. Wright, John A. Kinast, Joe McCarty:

Low-Latency Cryptographic Protection for SCADA Communications. 263-277 - Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin:

A Best Practice for Root CA Key Update in PKI. 278-291 - Stephen W. Boyd, Angelos D. Keromytis:

SQLrand: Preventing SQL Injection Attacks. 292-302
Cryptosystems: Design and Analysis
- Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:

Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. 303-309 - Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano:

Success Probability in Chi2-Attacks. 310-325 - Ali A. Kanso

:
More Generalized Clock-Controlled Alternating Step Generator. 326-338
Cryptographic Protocols
- Daisuke Inoue, Masahiro Kuroda:

FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. 339-354 - Anderson C. A. Nascimento

, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. 355-368 - Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng

, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. 369-382
Side Channels and Protocol Analysis
- Katsuyuki Okeya, Tsuyoshi Takagi:

Security Analysis of CRT-Based Cryptosystems. 383-397 - Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung:

Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. 398-413 - Shuhong Wang, Jie Wang, Maozhi Xu:

Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. 414-425
Intrusion Detection and DoS
- Hyung-Woo Lee:

Advanced Packet Marking Mechanism with Pushback for IP Traceback. 426-438 - Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li:

A Parallel Intrusion Detection System for High-Speed Networks. 439-451 - Dong Yu, Deborah A. Frincke:

A Novel Framework for Alert Correlation and Understanding. 452-466
Cryptographic Algorithms
- BaiJie Kuang, Yuefei Zhu, YaJuan Zhang:

An Improved Algorithm for uP + vQ Using JSF13. 467-478 - Palash Sarkar, Pradeep Kumar Mishra, Rana Barua:

New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn). 479-493 - Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:

Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. 494-508

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














