Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource)
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource)
Resource Information
The item Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Summary
- This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, in June 2007. The 31 revised full papers presented were carefully reviewed and selected from around 260 submissions. The papers are organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, security in wireless, ad-hoc, and peer-to-peer networks, as well as efficient implementation
- Language
- eng
- Extent
- XIII, 498 p. Also available online.
- Contents
-
- Signature Schemes I
- Generic Transformation to Strongly Unforgeable Signatures
- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
- Merkle Signatures with Virtually Unlimited Signature Capacity
- Computer and Network Security
- Midpoints Versus Endpoints: From Protocols to Firewalls
- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
- Cryptanalysis
- Cryptanalysis of the TRMC-4 Public Key Cryptosystem
- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack
- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA
- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
- Group-Oriented Security
- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
- Bayesian Methods for Practical Traitor Tracing
- Cryptographic Protocols
- A New Protocol for Conditional Disclosure of Secrets and Its Applications
- An Unconditionally Secure Protocol for Multi-Party Set Intersection
- Privacy-Preserving Set Union
- Anonymous Authentication
- Universal Accumulators with Efficient Nonmembership Proofs
- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
- Identity-Based Cryptography
- Identity-Based Proxy Re-encryption
- A More Natural Way to Construct Identity-Based Identification Schemes
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Certified E-Mail Protocol in the ID-Based Setting
- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks
- Efficient Content Authentication in Peer-to-Peer Networks
- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains
- BAP: Broadcast Authentication Using Cryptographic Puzzles
- Efficient Implementation
- Compressed XTR
- Sliding Window Method for NTRU
- Signature Schemes II
- Efficient Certificateless Signature Schemes
- Security Mediated Certificateless Signatures
- Gradually Convertible Undeniable Signatures
- Isbn
- 9783540727385
- Label
- Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
- Title
- Applied Cryptography and Network Security
- Title remainder
- 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
- Statement of responsibility
- edited by Jonathan Katz, Moti Yung
- Subject
-
- Computer Science
- Computer science
- Computers and Society
- Data Encryption
- Data encryption (Computer science)
- Data protection
- Electronic resources
- Information Systems
- Information Systems Applications (incl.Internet)
- Information systems
- Management of Computing and Information Systems
- Systems and Data Security
- Computer Communication Networks
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, in June 2007. The 31 revised full papers presented were carefully reviewed and selected from around 260 submissions. The papers are organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, security in wireless, ad-hoc, and peer-to-peer networks, as well as efficient implementation
- http://library.link/vocab/creatorName
- Katz, Jonathan
- Image bit depth
- 0
- LC call number
- QA76.9.A25
- Literary form
- non fiction
- http://library.link/vocab/relatedWorkOrContributorName
-
- Yung, Moti.
- SpringerLink
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 4521
- http://library.link/vocab/subjectName
-
- Computer science
- Computer Communication Networks
- Data protection
- Data encryption (Computer science)
- Information systems
- Information Systems
- Computer Science
- Data Encryption
- Computer Communication Networks
- Systems and Data Security
- Information Systems Applications (incl.Internet)
- Computers and Society
- Management of Computing and Information Systems
- Label
- Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Signature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures
- Dimensions
- unknown
- Extent
- XIII, 498 p. Also available online.
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540727385
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-540-72738-5
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-72738-5
- Label
- Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Signature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures
- Dimensions
- unknown
- Extent
- XIII, 498 p. Also available online.
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540727385
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-540-72738-5
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-72738-5
Subject
- Computer Science
- Computer science
- Computers and Society
- Data Encryption
- Data encryption (Computer science)
- Data protection
- Electronic resources
- Information Systems
- Information Systems Applications (incl.Internet)
- Information systems
- Management of Computing and Information Systems
- Systems and Data Security
- Computer Communication Networks
Member of
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Applied-Cryptography-and-Network-Security--5th/mh-50byCh2M/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Applied-Cryptography-and-Network-Security--5th/mh-50byCh2M/">Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Applied-Cryptography-and-Network-Security--5th/mh-50byCh2M/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Applied-Cryptography-and-Network-Security--5th/mh-50byCh2M/">Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings, edited by Jonathan Katz, Moti Yung, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>