skip to main content
Primo Advanced Search
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search prefilters

Applied cryptography and network security third international conference, ACNS 2005, New York, NY, USA, June 7-10 2005 : proceedings

ACNS 2005 (2005 New York, N.Y.) John Ioannidis; Angelos Keromytis; Moti Yung

Berlin Springer New York 2005

Acesso online. A biblioteca também possui exemplares impressos.

  • Título:
    Applied cryptography and network security third international conference, ACNS 2005, New York, NY, USA, June 7-10 2005 : proceedings
  • Autor: ACNS 2005 (2005 New York, N.Y.)
  • John Ioannidis; Angelos Keromytis; Moti Yung
  • Assuntos: Telecommunication -- Security measures -- Congresses; Data encryption (Computer science) -- Congresses; Cryptography -- Congresses; T el ecommunications -- S ecurit e -- Mesures -- Congr es; Chiffrement (Informatique) -- Congr es; Cryptographie -- Congr es; Authentifikation; Computersicherheit; Datensicherung; Internet; Kryptologie; Kryptosystem; Rechnernetz; COMPUTABILIDADE E COMPLEXIDADE (CONGRESSOS); CRIPTOLOGIA (CONGRESSOS); REDES E COMUNICAÇÃO DE DADOS (SEGURANÇA CONGRESSOS); Kongress; New York (NY, 2005)
  • Notas: Includes bibliographical references and index
  • Descrição: Two-server password-only authenticated key exchange / Jonathan Katz -- Strengthening password-based authentication protocols against online dictionary attacks / Peng Wang, Yongdae Kim, Vishal Kher -- Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme / Raphael C.-W. Phan and Bok-Min Goi -- Efficient security mechanisms for overlay multicast-based content distribution / Sencun Zhu, Chao Yao, Donggang Liu -- A traitor tracing scheme based on RSA for fast decryption / John Patrick McGregor, Yiqun Lisa Yin, and Ruby B. Lee -- N-party encrypted diffie-hellman key exchange using different passwords / Jin Wook Byun and Dong Hoon Lee -- Messin' with Texas deriving mother's maiden names using public records / Virgil Griffith and Markus Jakobsson -- Mitigating network denial-of-service through diversity-based traffic management / Ashraf Matrawy, Paul C. van Oorschot, and Anil Somayaji -- Searching for high-value rare events with uncheatable grid computing / Wenliang Du and Michael T. Goodrich -- Digital signatures do not guarantee exclusive ownership / Thomas Pornin and Julien P. Stern -- Thompson's group and public key cryptography / Vladimir Shpilrain and Alexander Ushakov -- Rainbow, a new multivariable polynomial signature scheme / Jintai Ding and Dieter Schmidt -- Badger : a fast and provably secure MAC / Martin Boesgaard, Thomas Christensen, and Erik Zenner -- IDS false alarm reduction using continuous and discontinuous patterns / Abdulrahman Alharby and Hideki Imai -- Indexing information for data forensics / Michael T. Goodrich, Mikhail J. Atallah, and Roberto Tamassia -- Model generalization and its implications on intrusion detection / Zhuowei Li, Amitabha Das, and Jianying Zhou -- Intrusion-resilient secure channels / Gene Itkis, Robert McNerney Jr., and Scott Russell -- Optimal asymmetric encryption and signature paddings Benoit Chevallier-Mames, Duong Hieu Phan, and David Pointcheval -- Efficient and l
  • Títulos relacionados: Série:Lecture notes in computer science 3531
  • Editor: Berlin Springer New York
  • Data de criação/publicação: 2005
  • Formato: xi, 530 p ill 24 cm.
  • Idioma: Inglês

Buscando em bases de dados remotas. Favor aguardar.