Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource)
Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource)
Resource Information
The item Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Summary
- This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003. The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications, intrusion detection, cryptographic algorithms, digital signatures, security modeling, Web security, security protocols, cryptanalysis, key management, and efficient implementations
- Language
- eng
- Extent
- XII, 440 p.
- Contents
-
- Cryptographic Applications
- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case
- Optimized ? 2-Attack against RC6
- Anonymity-Enhanced Pseudonym System
- Intrusion Detection
- Using Feedback to Improve Masquerade Detection
- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services
- An IP Traceback Scheme Integrating DPM and PPM
- Cryptographic Algorithms
- Improved Scalable Hash Chain Traversal
- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
- On the Security of Two Threshold Signature Schemes with Traceable Signers
- Digital Signature
- Proxy and Threshold One-Time Signatures
- A Threshold GQ Signature Scheme
- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
- Security Modelling
- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems
- An Authorization Model for E-consent Requirement in a Health Care Application
- PLI: A New Framework to Protect Digital Content for P2P Networks
- Web Security
- Improved Algebraic Traitor Tracing Scheme
- Common Vulnerability Markup Language
- Trust on Web Browser: Attack vs. Defense
- Security Protocols
- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party
- Using OCSP to Secure Certificate-Using Transactions in M-commerce
- Cryptanalysis
- Differential Fault Analysis on A.E.S
- Side-Channel Attack on Substitution Blocks
- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation
- A Fast Correlation Attack for LFSR-Based Stream Ciphers
- Key Management
- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient
- An Efficient Tree-Based Group Key Agreement Using Bilinear Map
- A Key Recovery Mechanism for Reliable Group Key Management
- Efficient Implementations
- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model
- Efficient Distributed Signcryption Scheme as Group Signcryption
- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors
- Isbn
- 9783540452034
- Label
- Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings
- Title
- Applied Cryptography and Network Security
- Title remainder
- First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings
- Statement of responsibility
- edited by Jianying Zhou, Moti Yung, Yongfei Han
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003. The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications, intrusion detection, cryptographic algorithms, digital signatures, security modeling, Web security, security protocols, cryptanalysis, key management, and efficient implementations
- http://library.link/vocab/creatorName
- Zhou, Jianying
- Image bit depth
- 0
- LC call number
- QA76.9.A25
- Literary form
- non fiction
- http://library.link/vocab/relatedWorkOrContributorName
-
- Yung, Moti.
- Han, Yongfei.
- SpringerLink
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 2846
- http://library.link/vocab/subjectName
-
- Computer science
- Computer Communication Networks
- Operating systems (Computers)
- Data encryption (Computer science)
- Information Systems
- Computer Science
- Data Encryption
- Computer Communication Networks
- Operating Systems
- Computers and Society
- Management of Computing and Information Systems
- Label
- Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors
- Dimensions
- unknown
- Extent
- XII, 440 p.
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540452034
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/b13996
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-45203-4
- Label
- Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors
- Dimensions
- unknown
- Extent
- XII, 440 p.
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540452034
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/b13996
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-45203-4
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Applied-Cryptography-and-Network-Security--First/zUIMa6UouwQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Applied-Cryptography-and-Network-Security--First/zUIMa6UouwQ/">Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Applied-Cryptography-and-Network-Security--First/zUIMa6UouwQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Applied-Cryptography-and-Network-Security--First/zUIMa6UouwQ/">Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings, edited by Jianying Zhou, Moti Yung, Yongfei Han, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>