×

Cryptology and network security. 4th international conference, CANS 2005, Xiamen, China, December 14–16, 2005. Proceedings. (English) Zbl 1098.94002

Lecture Notes in Computer Science 3810. Berlin: Springer (ISBN 3-540-30849-0/pbk). xi, 349 p. (2005).

Show indexed articles as search result.

The articles of this volume will be reviewed individually.
Indexed articles:
Yu, Hongbo; Wang, Gaoli; Zhang, Guoyan; Wang, Xiaoyun, The second-preimage attack on MD4, 1-12 [Zbl 1154.94442]
Huang, Xinyi; Susilo, Willy; Mu, Yi; Zhang, Futai, On the security of certificateless signature schemes from Asiacrypt 2003, 13-25 [Zbl 1154.94459]
Bao, Haiyong; Cao, Zhenfu; Qian, Haifeng, On the security of a group signcryption scheme from distributed signcryption scheme, 26-34 [Zbl 1154.94448]
Zhu, Wen Tao, Cryptanalysis of two group key management protocols for secure multicast, 35-48 [Zbl 1154.94444]
Shim, Kyung-Ah; Seo, Seung-Hyun, Security analysis of password-authenticated key agreement protocols, 49-58 [Zbl 1154.94432]
Li, Tao; Liu, Xiaojie; Li, Hongbin, An immune-based model for computer virus detection, 59-71 [Zbl 1154.94412]
Li, Tao; Liu, Xiaojie; Li, Hongbin, A new model for dynamic intrusion detection, 72-84 [Zbl 1154.94413]
Ando, Ruo; Takefuji, Yoshiyasu, Self debugging mode for patch-independent nullification of unknown remote process infection, 85-95 [Zbl 1154.68377]
Lu, Wei; Traore, Issa, A new unsupervised anomaly detection framework for detecting network attacks in real-time, 96-109 [Zbl 1154.68402]
Xu, Jing; Zhang, Zhenfeng; Feng, Dengguo, ID-based aggregate signatures from bilinear pairings, 110-119 [Zbl 1154.94477]
Huang, Zhenjie; Chen, Kefei; Wang, Yumin, Efficient identity-based signatures and blind signatures, 120-133 [Zbl 1154.94460]
Gao, Chong-zhi; Yao, Zheng-an, How to authenticate real time streams using improved online/offline signatures, 134-146 [Zbl 1154.94453]
Yoon, Eun-Jun; Yoo, Kee-Young, New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange, 147-160 [Zbl 1154.94479]
Wang, Qin; Cao, Zhenfu, Two proxy signcryption schemes from bilinear pairings, 161-171 [Zbl 1154.94474]
Zhou, Yuan; Cao, Zhenfu; Lu, Rongxing, Constructing secure warrant-based proxy signcryption schemes, 172-185 [Zbl 1154.94481]
Cimato, Stelvio; Galdi, Clemente; Giordano, Raffaella; Masucci, Barbara; Tomasco, Gildo, Design and implementation of an inline certified e-mail service, 186-199 [Zbl 1154.68387]
Zhang, Zhenfeng; Xu, Jing; Feng, Dengguo, Efficient identity-based protocol for fair certified e-mail delivery, 200-210 [Zbl 1154.68413]
Hu, Yuh-Hua; Wang, Lih-Chung; Chou, Chun-Yen; Lai, Feipei, Similar keys of multivariate quadratic public key cryptosystems, 211-222 [Zbl 1154.94398]
Kong, Fanyu; Li, Daxing, A note on signed binary window algorithm for elliptic curve cryptosystems, 223-235 [Zbl 1154.94408]
Ke, Pin-Hui; Liu, Tai-Lin; Wen, Qiao-Yan, Constructions of almost resilient functions, 236-246 [Zbl 1154.94404]
Peng, Kun; Dawson, Ed; Nieto, Juanma Gonzalez; Okamoto, Eiji; López, Javier, A novel method to maintain privacy in mobile agent applications, 247-260 [Zbl 1154.94428]
Øverlier, Lasse; Brekne, Tønnes; Årnes, André, Non-expanding transaction specific pseudonymization for IP traffic monitoring, 261-273 [Zbl 1154.68408]
Gu, Limin; Fang, Yanmei; Huang, Jiwu, Revaluation of error correcting coding in watermarking channel, 274-287 [Zbl 1154.94456]
Curtmola, Reza; Del Sorbo, Aniello; Ateniese, Giuseppe, On the performance and analysis of DNS security extensions, 288-303 [Zbl 1154.68389]
Lu, Liang; Safavi-Naini, Rei; Horton, Jeffrey; Susilo, Willy, On securing RTP-based streaming content with firewalls, 304-319 [Zbl 1154.68401]
Xiang, Yang; Zhou, Wanlei, Safeguard information infrastructure against DDoS attacks: experiments and modeling, 320-333 [Zbl 1154.68412]
Zhu, Xian; Wang, Shaobin; Hong, Fan; Liao, Junguo, Distributed credential chain discovery in trust-management with parameterized roles, 334-348 [Zbl 1154.68414]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94A60 Cryptography
68P25 Data encryption (aspects in computer science)
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI