


default search action
3rd ACNS 2005: New York, NY, USA
- John Ioannidis, Angelos D. Keromytis, Moti Yung:

Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3531, 2005, ISBN 3-540-26223-7 - Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor:

Two-Server Password-Only Authenticated Key Exchange. 1-16 - Peng Wang, Yongdae Kim

, Vishal Kher, Taekyoung Kwon:
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. 17-32 - Raphael Chung-Wei Phan, Bok-Min Goi:

Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. 33-39 - Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:

Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. 40-55 - John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee:

A Traitor Tracing Scheme Based on RSA for Fast Decryption. 56-74 - Jin Wook Byun, Dong Hoon Lee:

N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. 75-90 - Virgil Griffith, Markus Jakobsson:

Messin' with Texas Deriving Mother's Maiden Names Using Public Records. 91-103 - Ashraf Matrawy, Paul C. van Oorschot

, Anil Somayaji:
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. 104-121 - Wenliang Du, Michael T. Goodrich:

Searching for High-Value Rare Events with Uncheatable Grid Computing. 122-137 - Thomas Pornin, Julien P. Stern:

Digital Signatures Do Not Guarantee Exclusive Ownership. 138-150 - Vladimir Shpilrain, Alexander Ushakov

:
Thompson's Group and Public Key Cryptography. 151-163 - Jintai Ding

, Dieter Schmidt:
Rainbow, a New Multivariable Polynomial Signature Scheme. 164-175 - Martin Boesgaard, Thomas Christensen, Erik Zenner:

Badger - A Fast and Provably Secure MAC. 176-191 - Abdulrahman Alharby

, Hideki Imai:
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. 192-205 - Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia:

Indexing Information for Data Forensics. 206-221 - Zhuowei Li, Amitabha Das, Jianying Zhou:

Model Generalization and Its Implications on Intrusion Detection. 222-237 - Gene Itkis, Robert McNerney, Scott Russell:

Intrusion-Resilient Secure Channels. 238-253 - Benoît Chevallier-Mames, Duong Hieu Phan

, David Pointcheval
:
Optimal Asymmetric Encryption and Signature Paddings. 254-268 - SeongHan Shin, Kazukuni Kobara, Hideki Imai:

Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. 269-284 - Benoît Libert, Jean-Jacques Quisquater:

Identity Based Encryption Without Redundancy. 285-300 - Jiangtao Li, Ninghui Li:

OACerts: Oblivious Attribute Certificates. 301-317 - Lan Nguyen, Reihaneh Safavi-Naini:

Dynamic k-Times Anonymous Authentication. 318-333 - Guomin Yang

, Duncan S. Wong, Xiaotie Deng:
Efficient Anonymous Roaming and Its Security Analysis. 334-349 - Markus Jakobsson, Liu Yang:

Quantifying Security in Hybrid Cellular Networks. 350-363 - Flavio D. Garcia, Jaap-Henk Hoepman:

Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. 364-377 - Michael K. Reiter, XiaoFeng Wang, Matthew K. Wright:

Building Reliable Mix Networks with Fair Exchange. 378-392 - Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette:

SCARE of the DES. 393-406 - Boris Skoric, Pim Tuyls, W. Ophey:

Robust Key Extraction from Physical Uncloneable Functions. 407-422 - Yih-Chun Hu, Markus Jakobsson, Adrian Perrig:

Efficient Constructions for One-Way Hash Chains. 423-441 - Yan-Cheng Chang, Michael Mitzenmacher:

Privacy Preserving Keyword Searches on Remote Encrypted Data. 442-455 - Hsiao-Ying Lin, Wen-Guey Tzeng:

An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. 456-466 - Jens Groth

:
Non-interactive Zero-Knowledge Arguments for Voting. 467-482 - Rui Zhang, Jun Furukawa, Hideki Imai:

Short Signature and Universal Designated Verifier Signature Without Random Oracles. 483-498 - Sherman S. M. Chow

, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. 499-512 - Benoît Chevallier-Mames:

New Signature Schemes with Coupons and Tight Reduction. 513-528

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














