| 000 | 03414cam a2200349 a 4500 | ||
|---|---|---|---|
| 008 | 100309s2009 nyu 000 0 eng | ||
| 010 | _a2009929955 | ||
| 020 | _a9783642019562 (softcover : alk. paper) | ||
| 035 | _a(Sirsi) u4614 | ||
| 040 |
_aEG-CaNU _c EG-CaNU _d EG-CaNU |
||
| 042 | _ancode | ||
| 082 | 0 | 4 | _a005.8 |
| 245 | 0 | 0 |
_aApplied cryptography and network security : _b 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. proceedings / _c [edited by] Michel Abdalla, David Pointcheval, Pierre-Alain Fouque. |
| 250 | _a1st ed. | ||
| 260 |
_aNew York : _b Springer, _c 2009. |
||
| 300 | _ap. cm. | ||
| 490 | 0 |
_aLecture notes in computer science ; _v 5536 |
|
| 505 | _aGroup Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- Add to marked items Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Tracing and Revoking Pirate Rebroadcasts . | ||
| 520 | _aThis book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks. | ||
| 650 | 0 |
_aCommunication Networks _99215 |
|
| 650 | 0 |
_aDatabase management _x Computer programs. _99216 |
|
| 650 | 0 |
_aSecurity and Cryptology _99217 |
|
| 650 | 0 |
_aTheoretical computer science and general issues _92787 |
|
| 653 | _aad hoc networks | ||
| 653 | _aciphertext attack | ||
| 653 | _acryptanalysis | ||
| 653 | _ainternet security | ||
| 700 | 1 |
_a Abdalla , Michel _99218 |
|
| 920 | _a3642019560 (softcover : alk. paper) | ||
| 596 | _a1 | ||
| 999 |
_c3618 _d3618 |
||