default search action
6. CANS 2007: Singapore
- Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing:
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings. Lecture Notes in Computer Science 4856, Springer 2007, ISBN 978-3-540-76968-2
Signatures
- Fuchun Guo, Yi Mu, Zhide Chen:
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. 1-14 - Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu:
A Generic Construction for Universally-Convertible Undeniable Signatures. 15-33 - Loránd Szöllösi, Tamás Marosits, Gábor Fehér, András Recski:
Fast Digital Signature Algorithm Based on Subgraph Isomorphism. 34-46 - Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
Efficient ID-Based Digital Signatures with Message Recovery. 47-59
Network Security
- Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini:
Achieving Mobility and Anonymity in IP-Based Networks. 60-79 - Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. 80-101 - Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Forward-Secure Key Evolution in Wireless Sensor Networks. 102-120 - Jihwan Lim, Sangjin Kim, Heekuck Oh:
A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations. 121-132 - Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin:
An Intelligent Network-Warning Model with Strong Survivability. 133-145 - Sherman S. M. Chow:
Running on Karma - P2P Reputation and Currency Systems. 146-158
Secure Keyword Search and Private Information Retrieval
- Rui Zhang, Hideki Imai:
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. 159-174 - Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang:
Extended Private Information Retrieval and Its Application in Biometrics Authentications. 175-193
Public Key Encryption
- Yinxia Sun, Futai Zhang, Joonsang Baek:
Strongly Secure Certificateless Public Key Encryption Without Pairing. 194-208
Intrusion Detection
- Solahuddin B. Shamsuddin, Michael E. Woodward:
Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems. 209-227
Email Security
- Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu:
How to Secure Your Email Address Book and Beyond. 228-246
Denial of Service Attacks
- Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Toward Non-parallelizable Client Puzzles. 247-264
Authentication
- Vicente Benjumea, Seung Geol Choi, Javier López, Moti Yung:
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. 265-281
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.